Added Sigma Rules
This commit is contained in:
55
rules/Sigma/av_exploiting.yml
Normal file
55
rules/Sigma/av_exploiting.yml
Normal file
@@ -0,0 +1,55 @@
|
||||
title: Antivirus Exploitation Framework Detection
|
||||
author: Florian Roth
|
||||
date: 2018/09/09
|
||||
description: Detects a highly relevant Antivirus alert that reports an exploitation
|
||||
framework
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Signature: '*MeteTool*'
|
||||
SELECTION_10:
|
||||
Signature: '*CobaltStr*'
|
||||
SELECTION_11:
|
||||
Signature: '*COBEACON*'
|
||||
SELECTION_12:
|
||||
Signature: '*Cometer*'
|
||||
SELECTION_13:
|
||||
Signature: '*Razy*'
|
||||
SELECTION_2:
|
||||
Signature: '*MPreter*'
|
||||
SELECTION_3:
|
||||
Signature: '*Meterpreter*'
|
||||
SELECTION_4:
|
||||
Signature: '*Metasploit*'
|
||||
SELECTION_5:
|
||||
Signature: '*PowerSploit*'
|
||||
SELECTION_6:
|
||||
Signature: '*CobaltSrike*'
|
||||
SELECTION_7:
|
||||
Signature: '*Swrort*'
|
||||
SELECTION_8:
|
||||
Signature: '*Rozena*'
|
||||
SELECTION_9:
|
||||
Signature: '*Backdoor.Cobalt*'
|
||||
condition: (SELECTION_1 or SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10
|
||||
or SELECTION_11 or SELECTION_12 or SELECTION_13)
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
fields:
|
||||
- FileName
|
||||
- User
|
||||
id: 238527ad-3c2c-4e4f-a1f6-92fd63adb864
|
||||
level: critical
|
||||
logsource:
|
||||
product: antivirus
|
||||
modified: 2019/01/16
|
||||
references:
|
||||
- https://www.nextron-systems.com/2018/09/08/antivirus-event-analysis-cheat-sheet-v1-4/
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1203
|
||||
- attack.command_and_control
|
||||
- attack.t1219
|
||||
yml_filename: av_exploiting.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/malware
|
||||
|
||||
33
rules/Sigma/av_hacktool.yml
Normal file
33
rules/Sigma/av_hacktool.yml
Normal file
@@ -0,0 +1,33 @@
|
||||
title: Antivirus Hacktool Detection
|
||||
author: Florian Roth
|
||||
date: 2021/08/16
|
||||
description: Detects a highly relevant Antivirus alert that reports a hack tool or
|
||||
other attack tool
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Signature: HTOOL*
|
||||
SELECTION_2:
|
||||
Signature: HKTL*
|
||||
SELECTION_3:
|
||||
Signature: SecurityTool*
|
||||
SELECTION_4:
|
||||
Signature: ATK/*
|
||||
SELECTION_5:
|
||||
Signature: '*Hacktool*'
|
||||
condition: ((SELECTION_1 or SELECTION_2 or SELECTION_3 or SELECTION_4) or (SELECTION_5))
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
fields:
|
||||
- FileName
|
||||
- User
|
||||
id: fa0c05b6-8ad3-468d-8231-c1cbccb64fba
|
||||
level: high
|
||||
logsource:
|
||||
product: antivirus
|
||||
references:
|
||||
- https://www.nextron-systems.com/2021/08/16/antivirus-event-analysis-cheat-sheet-v1-8-2/
|
||||
tags:
|
||||
- attack.execution
|
||||
yml_filename: av_hacktool.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/malware
|
||||
|
||||
54
rules/Sigma/av_password_dumper.yml
Normal file
54
rules/Sigma/av_password_dumper.yml
Normal file
@@ -0,0 +1,54 @@
|
||||
title: Antivirus Password Dumper Detection
|
||||
author: Florian Roth
|
||||
date: 2018/09/09
|
||||
description: Detects a highly relevant Antivirus alert that reports a password dumper
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Signature: '*DumpCreds*'
|
||||
SELECTION_10:
|
||||
Signature: '*Kekeo*'
|
||||
SELECTION_11:
|
||||
Signature: '*LsassDump*'
|
||||
SELECTION_12:
|
||||
Signature: '*Outflank*'
|
||||
SELECTION_2:
|
||||
Signature: '*Mimikatz*'
|
||||
SELECTION_3:
|
||||
Signature: '*PWCrack*'
|
||||
SELECTION_4:
|
||||
Signature: '*HTool/WCE*'
|
||||
SELECTION_5:
|
||||
Signature: '*PSWtool*'
|
||||
SELECTION_6:
|
||||
Signature: '*PWDump*'
|
||||
SELECTION_7:
|
||||
Signature: '*SecurityTool*'
|
||||
SELECTION_8:
|
||||
Signature: '*PShlSpy*'
|
||||
SELECTION_9:
|
||||
Signature: '*Rubeus*'
|
||||
condition: (SELECTION_1 or SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10
|
||||
or SELECTION_11 or SELECTION_12)
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
fields:
|
||||
- FileName
|
||||
- User
|
||||
id: 78cc2dd2-7d20-4d32-93ff-057084c38b93
|
||||
level: critical
|
||||
logsource:
|
||||
product: antivirus
|
||||
modified: 2019/10/04
|
||||
references:
|
||||
- https://www.nextron-systems.com/2018/09/08/antivirus-event-analysis-cheat-sheet-v1-4/
|
||||
- https://www.virustotal.com/gui/file/5fcda49ee7f202559a6cbbb34edb65c33c9a1e0bde9fa2af06a6f11b55ded619/detection
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
- attack.t1558
|
||||
- attack.t1003.001
|
||||
- attack.t1003.002
|
||||
yml_filename: av_password_dumper.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/malware
|
||||
|
||||
31
rules/Sigma/av_printernightmare_cve_2021_34527.yml
Normal file
31
rules/Sigma/av_printernightmare_cve_2021_34527.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Antivirus PrinterNightmare CVE-2021-34527 Exploit Detection
|
||||
author: Sittikorn S, Nuttakorn T
|
||||
date: 2021/07/01
|
||||
description: Detects the suspicious file that is created from PoC code against Windows
|
||||
Print Spooler Remote Code Execution Vulnerability CVE-2021-34527 (PrinterNightmare),
|
||||
CVE-2021-1675 .
|
||||
detection:
|
||||
SELECTION_1:
|
||||
FileName: '*C:\Windows\System32\spool\drivers\x64\\*'
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
fields:
|
||||
- Signature
|
||||
- FileName
|
||||
- ComputerName
|
||||
id: 6fe1719e-ecdf-4caf-bffe-4f501cb0a561
|
||||
level: critical
|
||||
logsource:
|
||||
product: antivirus
|
||||
references:
|
||||
- https://twitter.com/mvelazco/status/1410291741241102338
|
||||
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675
|
||||
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527
|
||||
status: stable
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
- attack.t1055
|
||||
yml_filename: av_printernightmare_cve_2021_34527.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/malware
|
||||
|
||||
137
rules/Sigma/av_relevant_files.yml
Normal file
137
rules/Sigma/av_relevant_files.yml
Normal file
@@ -0,0 +1,137 @@
|
||||
title: Antivirus Relevant File Paths Alerts
|
||||
author: Florian Roth, Arnim Rupp
|
||||
date: 2018/09/09
|
||||
description: Detects an Antivirus alert in a highly relevant file path or with a relevant
|
||||
file name
|
||||
detection:
|
||||
SELECTION_1:
|
||||
FileName: C:\Windows\\*
|
||||
SELECTION_10:
|
||||
FileName: '*apache*'
|
||||
SELECTION_11:
|
||||
FileName: '*tomcat*'
|
||||
SELECTION_12:
|
||||
FileName: '*nginx*'
|
||||
SELECTION_13:
|
||||
FileName: '*weblogic*'
|
||||
SELECTION_14:
|
||||
Filename: '*.ps1'
|
||||
SELECTION_15:
|
||||
Filename: '*.psm1'
|
||||
SELECTION_16:
|
||||
Filename: '*.vbs'
|
||||
SELECTION_17:
|
||||
Filename: '*.bat'
|
||||
SELECTION_18:
|
||||
Filename: '*.cmd'
|
||||
SELECTION_19:
|
||||
Filename: '*.sh'
|
||||
SELECTION_2:
|
||||
FileName: C:\Temp\\*
|
||||
SELECTION_20:
|
||||
Filename: '*.chm'
|
||||
SELECTION_21:
|
||||
Filename: '*.xml'
|
||||
SELECTION_22:
|
||||
Filename: '*.txt'
|
||||
SELECTION_23:
|
||||
Filename: '*.jsp'
|
||||
SELECTION_24:
|
||||
Filename: '*.jspx'
|
||||
SELECTION_25:
|
||||
Filename: '*.asp'
|
||||
SELECTION_26:
|
||||
Filename: '*.aspx'
|
||||
SELECTION_27:
|
||||
Filename: '*.ashx'
|
||||
SELECTION_28:
|
||||
Filename: '*.asax'
|
||||
SELECTION_29:
|
||||
Filename: '*.asmx'
|
||||
SELECTION_3:
|
||||
FileName: C:\PerfLogs\\*
|
||||
SELECTION_30:
|
||||
Filename: '*.php'
|
||||
SELECTION_31:
|
||||
Filename: '*.cfm'
|
||||
SELECTION_32:
|
||||
Filename: '*.py'
|
||||
SELECTION_33:
|
||||
Filename: '*.pyc'
|
||||
SELECTION_34:
|
||||
Filename: '*.pl'
|
||||
SELECTION_35:
|
||||
Filename: '*.rb'
|
||||
SELECTION_36:
|
||||
Filename: '*.cgi'
|
||||
SELECTION_37:
|
||||
Filename: '*.war'
|
||||
SELECTION_38:
|
||||
Filename: '*.ear'
|
||||
SELECTION_39:
|
||||
Filename: '*.hta'
|
||||
SELECTION_4:
|
||||
FileName: C:\Users\Public\\*
|
||||
SELECTION_40:
|
||||
Filename: '*.lnk'
|
||||
SELECTION_41:
|
||||
Filename: '*.scf'
|
||||
SELECTION_42:
|
||||
Filename: '*.sct'
|
||||
SELECTION_43:
|
||||
Filename: '*.vbe'
|
||||
SELECTION_44:
|
||||
Filename: '*.wsf'
|
||||
SELECTION_45:
|
||||
Filename: '*.wsh'
|
||||
SELECTION_46:
|
||||
Filename: '*.gif'
|
||||
SELECTION_47:
|
||||
Filename: '*.png'
|
||||
SELECTION_48:
|
||||
Filename: '*.jpg'
|
||||
SELECTION_49:
|
||||
Filename: '*.jpeg'
|
||||
SELECTION_5:
|
||||
FileName: C:\Users\Default\\*
|
||||
SELECTION_50:
|
||||
Filename: '*.svg'
|
||||
SELECTION_51:
|
||||
Filename: '*.dat'
|
||||
SELECTION_6:
|
||||
FileName: '*\Client\\*'
|
||||
SELECTION_7:
|
||||
FileName: '*\tsclient\\*'
|
||||
SELECTION_8:
|
||||
FileName: '*\inetpub\\*'
|
||||
SELECTION_9:
|
||||
FileName: '*/www/*'
|
||||
condition: ((SELECTION_1 or SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5)
|
||||
or (SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10
|
||||
or SELECTION_11 or SELECTION_12 or SELECTION_13) or (SELECTION_14 or SELECTION_15
|
||||
or SELECTION_16 or SELECTION_17 or SELECTION_18 or SELECTION_19 or SELECTION_20
|
||||
or SELECTION_21 or SELECTION_22 or SELECTION_23 or SELECTION_24 or SELECTION_25
|
||||
or SELECTION_26 or SELECTION_27 or SELECTION_28 or SELECTION_29 or SELECTION_30
|
||||
or SELECTION_31 or SELECTION_32 or SELECTION_33 or SELECTION_34 or SELECTION_35
|
||||
or SELECTION_36 or SELECTION_37 or SELECTION_38 or SELECTION_39 or SELECTION_40
|
||||
or SELECTION_41 or SELECTION_42 or SELECTION_43 or SELECTION_44 or SELECTION_45
|
||||
or SELECTION_46 or SELECTION_47 or SELECTION_48 or SELECTION_49 or SELECTION_50
|
||||
or SELECTION_51))
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
fields:
|
||||
- Signature
|
||||
- User
|
||||
id: c9a88268-0047-4824-ba6e-4d81ce0b907c
|
||||
level: high
|
||||
logsource:
|
||||
product: antivirus
|
||||
modified: 2021/05/09
|
||||
references:
|
||||
- https://www.nextron-systems.com/2021/03/25/antivirus-event-analysis-cheat-sheet-v1-8/
|
||||
tags:
|
||||
- attack.resource_development
|
||||
- attack.t1588
|
||||
yml_filename: av_relevant_files.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/malware
|
||||
|
||||
126
rules/Sigma/av_webshell.yml
Normal file
126
rules/Sigma/av_webshell.yml
Normal file
@@ -0,0 +1,126 @@
|
||||
title: Antivirus Web Shell Detection
|
||||
author: Florian Roth, Arnim Rupp
|
||||
date: 2018/09/09
|
||||
description: Detects a highly relevant Antivirus alert that reports a web shell. It's
|
||||
highly recommended to tune this rule to the specific strings used by your anti
|
||||
virus solution by downloading a big webshell repo from e.g. github and checking
|
||||
the matches.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Signature: PHP/*
|
||||
SELECTION_10:
|
||||
Signature: IIS/BackDoor*
|
||||
SELECTION_11:
|
||||
Signature: JAVA/Backdoor*
|
||||
SELECTION_12:
|
||||
Signature: Troj/ASP*
|
||||
SELECTION_13:
|
||||
Signature: Troj/PHP*
|
||||
SELECTION_14:
|
||||
Signature: Troj/JSP*
|
||||
SELECTION_15:
|
||||
Signature: '*Webshell*'
|
||||
SELECTION_16:
|
||||
Signature: '*Chopper*'
|
||||
SELECTION_17:
|
||||
Signature: '*SinoChoper*'
|
||||
SELECTION_18:
|
||||
Signature: '*ASPXSpy*'
|
||||
SELECTION_19:
|
||||
Signature: '*Aspdoor*'
|
||||
SELECTION_2:
|
||||
Signature: JSP/*
|
||||
SELECTION_20:
|
||||
Signature: '*filebrowser*'
|
||||
SELECTION_21:
|
||||
Signature: '*PHP_*'
|
||||
SELECTION_22:
|
||||
Signature: '*JSP_*'
|
||||
SELECTION_23:
|
||||
Signature: '*ASP_*'
|
||||
SELECTION_24:
|
||||
Signature: '*PHP:*'
|
||||
SELECTION_25:
|
||||
Signature: '*JSP:*'
|
||||
SELECTION_26:
|
||||
Signature: '*ASP:*'
|
||||
SELECTION_27:
|
||||
Signature: '*Perl:*'
|
||||
SELECTION_28:
|
||||
Signature: '*PHPShell*'
|
||||
SELECTION_29:
|
||||
Signature: '*Trojan.PHP*'
|
||||
SELECTION_3:
|
||||
Signature: ASP/*
|
||||
SELECTION_30:
|
||||
Signature: '*Trojan.ASP*'
|
||||
SELECTION_31:
|
||||
Signature: '*Trojan.JSP*'
|
||||
SELECTION_32:
|
||||
Signature: '*Trojan.VBS*'
|
||||
SELECTION_33:
|
||||
Signature: '*PHP?Agent*'
|
||||
SELECTION_34:
|
||||
Signature: '*ASP?Agent*'
|
||||
SELECTION_35:
|
||||
Signature: '*JSP?Agent*'
|
||||
SELECTION_36:
|
||||
Signature: '*VBS?Agent*'
|
||||
SELECTION_37:
|
||||
Signature: '*Backdoor?PHP*'
|
||||
SELECTION_38:
|
||||
Signature: '*Backdoor?JSP*'
|
||||
SELECTION_39:
|
||||
Signature: '*Backdoor?ASP*'
|
||||
SELECTION_4:
|
||||
Signature: Perl/*
|
||||
SELECTION_40:
|
||||
Signature: '*Backdoor?VBS*'
|
||||
SELECTION_41:
|
||||
Signature: '*Backdoor?Java*'
|
||||
SELECTION_5:
|
||||
Signature: PHP.*
|
||||
SELECTION_6:
|
||||
Signature: JSP.*
|
||||
SELECTION_7:
|
||||
Signature: ASP.*
|
||||
SELECTION_8:
|
||||
Signature: Perl.*
|
||||
SELECTION_9:
|
||||
Signature: VBS/Uxor*
|
||||
condition: ((SELECTION_1 or SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10
|
||||
or SELECTION_11 or SELECTION_12 or SELECTION_13 or SELECTION_14) or (SELECTION_15
|
||||
or SELECTION_16 or SELECTION_17 or SELECTION_18 or SELECTION_19 or SELECTION_20
|
||||
or SELECTION_21 or SELECTION_22 or SELECTION_23 or SELECTION_24 or SELECTION_25
|
||||
or SELECTION_26 or SELECTION_27 or SELECTION_28 or SELECTION_29 or SELECTION_30
|
||||
or SELECTION_31 or SELECTION_32 or SELECTION_33 or SELECTION_34 or SELECTION_35
|
||||
or SELECTION_36 or SELECTION_37 or SELECTION_38 or SELECTION_39 or SELECTION_40
|
||||
or SELECTION_41))
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
fields:
|
||||
- FileName
|
||||
- User
|
||||
id: fdf135a2-9241-4f96-a114-bb404948f736
|
||||
level: critical
|
||||
logsource:
|
||||
product: antivirus
|
||||
modified: 2021/05/08
|
||||
references:
|
||||
- https://www.nextron-systems.com/2021/03/25/antivirus-event-analysis-cheat-sheet-v1-8/
|
||||
- https://github.com/tennc/webshell
|
||||
- https://www.virustotal.com/gui/file/bd1d52289203866645e556e2766a21d2275877fbafa056a76fe0cf884b7f8819/detection
|
||||
- https://www.virustotal.com/gui/file/308487ed28a3d9abc1fec7ebc812d4b5c07ab025037535421f64c60d3887a3e8/detection
|
||||
- https://www.virustotal.com/gui/file/7d3cb8a8ff28f82b07f382789247329ad2d7782a72dde9867941f13266310c80/detection
|
||||
- https://www.virustotal.com/gui/file/e841675a4b82250c75273ebf0861245f80c6a1c3d5803c2d995d9d3b18d5c4b5/detection
|
||||
- https://www.virustotal.com/gui/file/a80042c61a0372eaa0c2c1e831adf0d13ef09feaf71d1d20b216156269045801/detection
|
||||
- https://www.virustotal.com/gui/file/b219f7d3c26f8bad7e175934cd5eda4ddb5e3983503e94ff07d39c0666821b7e/detection
|
||||
- https://www.virustotal.com/gui/file/b8702acf32fd651af9f809ed42d15135f842788cd98d81a8e1b154ee2a2b76a2/detection
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.t1100
|
||||
- attack.t1505.003
|
||||
yml_filename: av_webshell.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/malware
|
||||
|
||||
36
rules/Sigma/dns_net_mal_cobaltstrike.yml
Normal file
36
rules/Sigma/dns_net_mal_cobaltstrike.yml
Normal file
@@ -0,0 +1,36 @@
|
||||
title: Suspicious Cobalt Strike DNS Beaconing
|
||||
author: Florian Roth
|
||||
date: 2021/11/09
|
||||
description: Detects a program that invoked suspicious DNS queries known from Cobalt
|
||||
Strike beacons
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 22
|
||||
SELECTION_2:
|
||||
QueryName: aaa.stage.*
|
||||
SELECTION_3:
|
||||
QueryName: post.1*
|
||||
SELECTION_4:
|
||||
QueryName: '*.stage.123456.*'
|
||||
condition: (SELECTION_1 and ((SELECTION_2 or SELECTION_3) or SELECTION_4))
|
||||
falsepositives:
|
||||
- Unknown
|
||||
fields:
|
||||
- Image
|
||||
- CommandLine
|
||||
id: f356a9c4-effd-4608-bbf8-408afd5cd006
|
||||
level: critical
|
||||
logsource:
|
||||
category: dns_query
|
||||
product: windows
|
||||
references:
|
||||
- https://www.icebrg.io/blog/footprints-of-fin7-tracking-actor-patterns
|
||||
- https://www.sekoia.io/en/hunting-and-detecting-cobalt-strike/
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.command_and_control
|
||||
- attack.t1071
|
||||
- attack.t1071.004
|
||||
yml_filename: dns_net_mal_cobaltstrike.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/dns_query
|
||||
|
||||
75
rules/Sigma/dns_net_susp_ipify.yml
Normal file
75
rules/Sigma/dns_net_susp_ipify.yml
Normal file
@@ -0,0 +1,75 @@
|
||||
title: Suspicious DNS Query for IP Lookup Service APIs
|
||||
author: Brandon George (blog post), Thomas Patzke (rule)
|
||||
date: 2021/07/08
|
||||
description: Detects DNS queries for ip lookup services such as api.ipify.org not
|
||||
originating from a browser process.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 22
|
||||
SELECTION_10:
|
||||
QueryName: api.ipify.org
|
||||
SELECTION_11:
|
||||
QueryName: ip-api.com
|
||||
SELECTION_12:
|
||||
QueryName: checkip.amazonaws.com
|
||||
SELECTION_13:
|
||||
QueryName: ipecho.net
|
||||
SELECTION_14:
|
||||
QueryName: ipinfo.io
|
||||
SELECTION_15:
|
||||
QueryName: ipv4bot.whatismyipaddress.com
|
||||
SELECTION_16:
|
||||
QueryName: freegeoip.app
|
||||
SELECTION_17:
|
||||
Image: '*\chrome.exe'
|
||||
SELECTION_18:
|
||||
Image: '*\iexplore.exe'
|
||||
SELECTION_19:
|
||||
Image: '*\firefox.exe'
|
||||
SELECTION_2:
|
||||
QueryName: canireachthe.net
|
||||
SELECTION_20:
|
||||
Image: '*\brave.exe'
|
||||
SELECTION_21:
|
||||
Image: '*\opera.exe'
|
||||
SELECTION_22:
|
||||
Image: '*\msedge.exe'
|
||||
SELECTION_23:
|
||||
Image: '*\vivaldi.exe'
|
||||
SELECTION_3:
|
||||
QueryName: ipv4.icanhazip.com
|
||||
SELECTION_4:
|
||||
QueryName: ip.anysrc.net
|
||||
SELECTION_5:
|
||||
QueryName: edns.ip-api.com
|
||||
SELECTION_6:
|
||||
QueryName: wtfismyip.com
|
||||
SELECTION_7:
|
||||
QueryName: checkip.dyndns.org
|
||||
SELECTION_8:
|
||||
QueryName: api.2ip.ua
|
||||
SELECTION_9:
|
||||
QueryName: icanhazip.com
|
||||
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10
|
||||
or SELECTION_11 or SELECTION_12 or SELECTION_13 or SELECTION_14 or SELECTION_15
|
||||
or SELECTION_16) and not ((SELECTION_17 or SELECTION_18 or SELECTION_19 or
|
||||
SELECTION_20 or SELECTION_21 or SELECTION_22 or SELECTION_23)))
|
||||
falsepositives:
|
||||
- Legitimate usage of ip lookup services such as ipify API
|
||||
id: ec82e2a5-81ea-4211-a1f8-37a0286df2c2
|
||||
level: medium
|
||||
logsource:
|
||||
category: dns_query
|
||||
product: windows
|
||||
modified: 2021/09/10
|
||||
references:
|
||||
- https://www.binarydefense.com/analysis-of-hancitor-when-boring-begets-beacon
|
||||
- https://twitter.com/neonprimetime/status/1436376497980428318
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.reconnaissance
|
||||
- attack.t1590
|
||||
yml_filename: dns_net_susp_ipify.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/dns_query
|
||||
|
||||
29
rules/Sigma/dns_query_hybridconnectionmgr_servicebus.yml
Normal file
29
rules/Sigma/dns_query_hybridconnectionmgr_servicebus.yml
Normal file
@@ -0,0 +1,29 @@
|
||||
title: DNS HybridConnectionManager Service Bus
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
date: 2021/04/12
|
||||
description: Detects Azure Hybrid Connection Manager services querying the Azure service
|
||||
bus service
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 22
|
||||
SELECTION_2:
|
||||
QueryName: '*servicebus.windows.net*'
|
||||
SELECTION_3:
|
||||
Image: '*HybridConnectionManager*'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Legitimate use of Azure Hybrid Connection Manager and the Azure Service Bus service
|
||||
id: 7bd3902d-8b8b-4dd4-838a-c6862d40150d
|
||||
level: high
|
||||
logsource:
|
||||
category: dns_query
|
||||
product: windows
|
||||
modified: 2021/06/10
|
||||
references:
|
||||
- https://twitter.com/Cyb3rWard0g/status/1381642789369286662
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.persistence
|
||||
yml_filename: dns_query_hybridconnectionmgr_servicebus.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/dns_query
|
||||
|
||||
26
rules/Sigma/dns_query_mega_nz.yml
Normal file
26
rules/Sigma/dns_query_mega_nz.yml
Normal file
@@ -0,0 +1,26 @@
|
||||
title: DNS Query for MEGA.io Upload Domain
|
||||
author: Aaron Greetham (@beardofbinary) - NCC Group
|
||||
date: 2021/05/26
|
||||
description: Detects DNS queries for subdomains used for upload to MEGA.io
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 22
|
||||
SELECTION_2:
|
||||
QueryName: '*userstorage.mega.co.nz*'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- Legitimate Mega upload
|
||||
id: 613c03ba-0779-4a53-8a1f-47f914a4ded3
|
||||
level: high
|
||||
logsource:
|
||||
category: dns_query
|
||||
product: windows
|
||||
references:
|
||||
- https://research.nccgroup.com/2021/05/27/detecting-rclone-an-effective-tool-for-exfiltration/
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.exfiltration
|
||||
- attack.t1567.002
|
||||
yml_filename: dns_query_mega_nz.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/dns_query
|
||||
|
||||
118
rules/Sigma/dns_query_possible_dns_rebinding.yml
Normal file
118
rules/Sigma/dns_query_possible_dns_rebinding.yml
Normal file
@@ -0,0 +1,118 @@
|
||||
title: Possible DNS Rebinding
|
||||
author: Ilyas Ochkov, oscd.community
|
||||
date: 2019/10/25
|
||||
description: Detects several different DNS-answers by one domain with IPs from internal
|
||||
and external networks. Normally, DNS-answer contain TTL >100. (DNS-record will
|
||||
saved in host cache for a while TTL).
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 22
|
||||
SELECTION_10:
|
||||
QueryResults: (::ffff:)?172.20.*
|
||||
SELECTION_11:
|
||||
QueryResults: (::ffff:)?172.21.*
|
||||
SELECTION_12:
|
||||
QueryResults: (::ffff:)?172.22.*
|
||||
SELECTION_13:
|
||||
QueryResults: (::ffff:)?172.23.*
|
||||
SELECTION_14:
|
||||
QueryResults: (::ffff:)?172.24.*
|
||||
SELECTION_15:
|
||||
QueryResults: (::ffff:)?172.25.*
|
||||
SELECTION_16:
|
||||
QueryResults: (::ffff:)?172.26.*
|
||||
SELECTION_17:
|
||||
QueryResults: (::ffff:)?172.27.*
|
||||
SELECTION_18:
|
||||
QueryResults: (::ffff:)?172.28.*
|
||||
SELECTION_19:
|
||||
QueryResults: (::ffff:)?172.29.*
|
||||
SELECTION_2:
|
||||
QueryName: '*'
|
||||
SELECTION_20:
|
||||
QueryResults: (::ffff:)?172.30.*
|
||||
SELECTION_21:
|
||||
QueryResults: (::ffff:)?172.31.*
|
||||
SELECTION_22:
|
||||
QueryResults: (::ffff:)?127.*
|
||||
SELECTION_23:
|
||||
QueryName: '*'
|
||||
SELECTION_24:
|
||||
QueryStatus: '0'
|
||||
SELECTION_25:
|
||||
QueryResults: (::ffff:)?10.*
|
||||
SELECTION_26:
|
||||
QueryResults: (::ffff:)?192.168.*
|
||||
SELECTION_27:
|
||||
QueryResults: (::ffff:)?172.16.*
|
||||
SELECTION_28:
|
||||
QueryResults: (::ffff:)?172.17.*
|
||||
SELECTION_29:
|
||||
QueryResults: (::ffff:)?172.18.*
|
||||
SELECTION_3:
|
||||
QueryStatus: '0'
|
||||
SELECTION_30:
|
||||
QueryResults: (::ffff:)?172.19.*
|
||||
SELECTION_31:
|
||||
QueryResults: (::ffff:)?172.20.*
|
||||
SELECTION_32:
|
||||
QueryResults: (::ffff:)?172.21.*
|
||||
SELECTION_33:
|
||||
QueryResults: (::ffff:)?172.22.*
|
||||
SELECTION_34:
|
||||
QueryResults: (::ffff:)?172.23.*
|
||||
SELECTION_35:
|
||||
QueryResults: (::ffff:)?172.24.*
|
||||
SELECTION_36:
|
||||
QueryResults: (::ffff:)?172.25.*
|
||||
SELECTION_37:
|
||||
QueryResults: (::ffff:)?172.26.*
|
||||
SELECTION_38:
|
||||
QueryResults: (::ffff:)?172.27.*
|
||||
SELECTION_39:
|
||||
QueryResults: (::ffff:)?172.28.*
|
||||
SELECTION_4:
|
||||
QueryResults: (::ffff:)?10.*
|
||||
SELECTION_40:
|
||||
QueryResults: (::ffff:)?172.29.*
|
||||
SELECTION_41:
|
||||
QueryResults: (::ffff:)?172.30.*
|
||||
SELECTION_42:
|
||||
QueryResults: (::ffff:)?172.31.*
|
||||
SELECTION_43:
|
||||
QueryResults: (::ffff:)?127.*
|
||||
SELECTION_5:
|
||||
QueryResults: (::ffff:)?192.168.*
|
||||
SELECTION_6:
|
||||
QueryResults: (::ffff:)?172.16.*
|
||||
SELECTION_7:
|
||||
QueryResults: (::ffff:)?172.17.*
|
||||
SELECTION_8:
|
||||
QueryResults: (::ffff:)?172.18.*
|
||||
SELECTION_9:
|
||||
QueryResults: (::ffff:)?172.19.*
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and (SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10
|
||||
or SELECTION_11 or SELECTION_12 or SELECTION_13 or SELECTION_14 or SELECTION_15
|
||||
or SELECTION_16 or SELECTION_17 or SELECTION_18 or SELECTION_19 or SELECTION_20
|
||||
or SELECTION_21 or SELECTION_22) and (SELECTION_23 and SELECTION_24) and not
|
||||
((SELECTION_25 or SELECTION_26 or SELECTION_27 or SELECTION_28 or SELECTION_29
|
||||
or SELECTION_30 or SELECTION_31 or SELECTION_32 or SELECTION_33 or SELECTION_34
|
||||
or SELECTION_35 or SELECTION_36 or SELECTION_37 or SELECTION_38 or SELECTION_39
|
||||
or SELECTION_40 or SELECTION_41 or SELECTION_42 or SELECTION_43)))| count(QueryName)
|
||||
by ComputerName > 3
|
||||
id: eb07e747-2552-44cd-af36-b659ae0958e4
|
||||
level: medium
|
||||
logsource:
|
||||
category: dns_query
|
||||
product: windows
|
||||
modified: 2020/08/28
|
||||
references:
|
||||
- https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1189
|
||||
yml_filename: dns_query_possible_dns_rebinding.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/dns_query
|
||||
|
||||
42
rules/Sigma/dns_query_regsvr32_network_activity.yml
Normal file
42
rules/Sigma/dns_query_regsvr32_network_activity.yml
Normal file
@@ -0,0 +1,42 @@
|
||||
title: Regsvr32 Network Activity
|
||||
author: Dmitriy Lifanov, oscd.community
|
||||
date: 2019/10/25
|
||||
description: Detects network connections and DNS queries initiated by Regsvr32.exe
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 22
|
||||
SELECTION_2:
|
||||
Image: '*\regsvr32.exe'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- unknown
|
||||
fields:
|
||||
- ComputerName
|
||||
- User
|
||||
- Image
|
||||
- DestinationIp
|
||||
- DestinationPort
|
||||
id: 36e037c4-c228-4866-b6a3-48eb292b9955
|
||||
level: high
|
||||
logsource:
|
||||
category: dns_query
|
||||
product: windows
|
||||
modified: 2021/09/21
|
||||
references:
|
||||
- https://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32/
|
||||
- https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1117/T1117.md
|
||||
related:
|
||||
- id: c7e91a02-d771-4a6d-a700-42587e0b1095
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1559.001
|
||||
- attack.t1175
|
||||
- attack.defense_evasion
|
||||
- attack.t1218.010
|
||||
- attack.t1117
|
||||
yml_filename: dns_query_regsvr32_network_activity.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/dns_query
|
||||
|
||||
52
rules/Sigma/driver_load_mal_creddumper.yml
Normal file
52
rules/Sigma/driver_load_mal_creddumper.yml
Normal file
@@ -0,0 +1,52 @@
|
||||
title: Credential Dumping Tools Service Execution
|
||||
author: Florian Roth, Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community
|
||||
date: 2017/03/05
|
||||
description: Detects well-known credential dumping tools execution via service execution
|
||||
events
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 6
|
||||
SELECTION_2:
|
||||
ImageLoaded: '*fgexec*'
|
||||
SELECTION_3:
|
||||
ImageLoaded: '*dumpsvc*'
|
||||
SELECTION_4:
|
||||
ImageLoaded: '*cachedump*'
|
||||
SELECTION_5:
|
||||
ImageLoaded: '*mimidrv*'
|
||||
SELECTION_6:
|
||||
ImageLoaded: '*gsecdump*'
|
||||
SELECTION_7:
|
||||
ImageLoaded: '*servpw*'
|
||||
SELECTION_8:
|
||||
ImageLoaded: '*pwdump*'
|
||||
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8))
|
||||
falsepositives:
|
||||
- Legitimate Administrator using credential dumping tool for password recovery
|
||||
id: df5ff0a5-f83f-4a5b-bba1-3e6a3f6f6ea2
|
||||
level: critical
|
||||
logsource:
|
||||
category: driver_load
|
||||
product: windows
|
||||
modified: 2021/11/10
|
||||
references:
|
||||
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
|
||||
related:
|
||||
- id: 4976aa50-8f41-45c6-8b15-ab3fc10e79ed
|
||||
type: derived
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.execution
|
||||
- attack.t1003
|
||||
- attack.t1003.001
|
||||
- attack.t1003.002
|
||||
- attack.t1003.004
|
||||
- attack.t1003.005
|
||||
- attack.t1003.006
|
||||
- attack.t1035
|
||||
- attack.t1569.002
|
||||
- attack.s0005
|
||||
yml_filename: driver_load_mal_creddumper.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/driver_load
|
||||
|
||||
@@ -0,0 +1,69 @@
|
||||
title: Meterpreter or Cobalt Strike Getsystem Service Installation
|
||||
author: Teymur Kheirkhabarov, Ecco, Florian Roth
|
||||
date: 2019/10/26
|
||||
description: Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting
|
||||
a specific service installation
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 6
|
||||
SELECTION_10:
|
||||
ImagePath: '*cmd.exe*'
|
||||
SELECTION_11:
|
||||
ImagePath: '*/c*'
|
||||
SELECTION_12:
|
||||
ImagePath: '*echo*'
|
||||
SELECTION_13:
|
||||
ImagePath: '*\pipe\\*'
|
||||
SELECTION_14:
|
||||
ImagePath: '*rundll32*'
|
||||
SELECTION_15:
|
||||
ImagePath: '*.dll,a*'
|
||||
SELECTION_16:
|
||||
ImagePath: '*/p:*'
|
||||
SELECTION_2:
|
||||
ImagePath: '*cmd*'
|
||||
SELECTION_3:
|
||||
ImagePath: '*/c*'
|
||||
SELECTION_4:
|
||||
ImagePath: '*echo*'
|
||||
SELECTION_5:
|
||||
ImagePath: '*\pipe\\*'
|
||||
SELECTION_6:
|
||||
ImagePath: '*%COMSPEC%*'
|
||||
SELECTION_7:
|
||||
ImagePath: '*/c*'
|
||||
SELECTION_8:
|
||||
ImagePath: '*echo*'
|
||||
SELECTION_9:
|
||||
ImagePath: '*\pipe\\*'
|
||||
condition: (SELECTION_1 and ((SELECTION_2 and SELECTION_3 and SELECTION_4 and
|
||||
SELECTION_5) or (SELECTION_6 and SELECTION_7 and SELECTION_8 and SELECTION_9)
|
||||
or (SELECTION_10 and SELECTION_11 and SELECTION_12 and SELECTION_13) or (SELECTION_14
|
||||
and SELECTION_15 and SELECTION_16)))
|
||||
falsepositives:
|
||||
- Highly unlikely
|
||||
fields:
|
||||
- ComputerName
|
||||
- SubjectDomainName
|
||||
- SubjectUserName
|
||||
- ImagePath
|
||||
id: d585ab5a-6a69-49a8-96e8-4a726a54de46
|
||||
level: critical
|
||||
logsource:
|
||||
category: driver_load
|
||||
product: windows
|
||||
modified: 2021/09/21
|
||||
references:
|
||||
- https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
|
||||
- https://blog.cobaltstrike.com/2014/04/02/what-happens-when-i-type-getsystem/
|
||||
related:
|
||||
- id: 843544a7-56e0-4dcc-a44f-5cc266dd97d6
|
||||
type: derived
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
- attack.t1134
|
||||
- attack.t1134.001
|
||||
- attack.t1134.002
|
||||
yml_filename: driver_load_meterpreter_or_cobaltstrike_getsystem_service_installation.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/driver_load
|
||||
|
||||
@@ -0,0 +1,32 @@
|
||||
title: PowerShell Scripts Run by a Services
|
||||
author: oscd.community, Natalia Shornikova
|
||||
date: 2020/10/06
|
||||
description: Detects powershell script installed as a Service
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 6
|
||||
SELECTION_2:
|
||||
ImageLoaded: '*powershell*'
|
||||
SELECTION_3:
|
||||
ImageLoaded: '*pwsh*'
|
||||
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3))
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 46deb5e1-28c9-4905-b2df-51cdcc9e6073
|
||||
level: high
|
||||
logsource:
|
||||
category: driver_load
|
||||
product: windows
|
||||
modified: 2021/09/21
|
||||
references:
|
||||
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse
|
||||
related:
|
||||
- id: a2e5019d-a658-4c6a-92bf-7197b54e2cae
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1569.002
|
||||
yml_filename: driver_load_powershell_script_installed_as_service.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/driver_load
|
||||
|
||||
26
rules/Sigma/driver_load_susp_temp_use.yml
Normal file
26
rules/Sigma/driver_load_susp_temp_use.yml
Normal file
@@ -0,0 +1,26 @@
|
||||
title: Suspicious Driver Load from Temp
|
||||
author: Florian Roth
|
||||
date: 2017/02/12
|
||||
description: Detects a driver load from a temporary directory
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 6
|
||||
SELECTION_2:
|
||||
ImageLoaded: '*\Temp\\*'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- there is a relevant set of false positives depending on applications in the environment
|
||||
id: 2c4523d5-d481-4ed0-8ec3-7fbf0cb41a75
|
||||
level: high
|
||||
logsource:
|
||||
category: driver_load
|
||||
product: windows
|
||||
modified: 2020/08/23
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.privilege_escalation
|
||||
- attack.t1050
|
||||
- attack.t1543.003
|
||||
yml_filename: driver_load_susp_temp_use.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/driver_load
|
||||
|
||||
39
rules/Sigma/driver_load_vuln_dell_driver.yml
Normal file
39
rules/Sigma/driver_load_vuln_dell_driver.yml
Normal file
@@ -0,0 +1,39 @@
|
||||
title: Vulnerable Dell BIOS Update Driver Load
|
||||
author: Florian Roth
|
||||
date: 2021/05/05
|
||||
description: Detects the load of the vulnerable Dell BIOS update driver as reported
|
||||
in CVE-2021-21551
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 6
|
||||
SELECTION_2:
|
||||
ImageLoaded: '*\DBUtil_2_3.Sys*'
|
||||
SELECTION_3:
|
||||
Hashes: '*0296e2ce999e67c76352613a718e11516fe1b0efc3ffdb8918fc999dd76a73a5*'
|
||||
SELECTION_4:
|
||||
Hashes: '*c948ae14761095e4d76b55d9de86412258be7afd*'
|
||||
SELECTION_5:
|
||||
Hashes: '*c996d7971c49252c582171d9380360f2*'
|
||||
SELECTION_6:
|
||||
Hashes: '*ddbf5ecca5c8086afde1fb4f551e9e6400e94f4428fe7fb5559da5cffa654cc1*'
|
||||
SELECTION_7:
|
||||
Hashes: '*10b30bdee43b3a2ec4aa63375577ade650269d25*'
|
||||
SELECTION_8:
|
||||
Hashes: '*d2fd132ab7bbc6bbb87a84f026fa0244*'
|
||||
condition: (SELECTION_1 and (SELECTION_2 or (SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8)))
|
||||
falsepositives:
|
||||
- legitimate BIOS driver updates (should be rare)
|
||||
id: 21b23707-60d6-41bb-96e3-0f0481b0fed9
|
||||
level: high
|
||||
logsource:
|
||||
category: driver_load
|
||||
product: windows
|
||||
references:
|
||||
- https://labs.sentinelone.com/cve-2021-21551-hundreds-of-millions-of-dell-computers-at-risk-due-to-multiple-bios-driver-privilege-escalation-flaws/
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
- cve.2021.21551
|
||||
yml_filename: driver_load_vuln_dell_driver.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/driver_load
|
||||
|
||||
32
rules/Sigma/driver_load_windivert.yml
Normal file
32
rules/Sigma/driver_load_windivert.yml
Normal file
@@ -0,0 +1,32 @@
|
||||
title: WinDivert Driver Load
|
||||
author: Florian Roth
|
||||
date: 2021/07/30
|
||||
description: Detects the load of the Windiver driver, a powerful user-mode capture/sniffing/modification/blocking/re-injection
|
||||
package for Windows
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 6
|
||||
SELECTION_2:
|
||||
ImageLoaded: '*\WinDivert.sys*'
|
||||
SELECTION_3:
|
||||
ImageLoaded: '*\WinDivert64.sys*'
|
||||
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3))
|
||||
falsepositives:
|
||||
- legitimate WinDivert driver usage
|
||||
id: 679085d5-f427-4484-9f58-1dc30a7c426d
|
||||
level: high
|
||||
logsource:
|
||||
category: driver_load
|
||||
product: windows
|
||||
references:
|
||||
- https://reqrypt.org/windivert-doc.html
|
||||
- https://rastamouse.me/ntlm-relaying-via-cobalt-strike/
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.collection
|
||||
- attack.defense_evasion
|
||||
- attack.t1599.001
|
||||
- attack.t1557.001
|
||||
yml_filename: driver_load_windivert.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/driver_load
|
||||
|
||||
41
rules/Sigma/edr_command_execution_by_office_applications.yml
Normal file
41
rules/Sigma/edr_command_execution_by_office_applications.yml
Normal file
@@ -0,0 +1,41 @@
|
||||
title: EDR WMI Command Execution by Office Applications
|
||||
author: Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule)
|
||||
date: 2021/08/23
|
||||
description: Initial execution of malicious document calls wmic Win32_Process::Create
|
||||
to execute the file with regsvr32
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventLog: EDR
|
||||
SELECTION_2:
|
||||
EventType: WMIExecution
|
||||
SELECTION_3:
|
||||
WMIcommand: '*Win32_Process\:\:Create*'
|
||||
SELECTION_4:
|
||||
Image: '*\winword.exe'
|
||||
SELECTION_5:
|
||||
Image: '*\excel.exe'
|
||||
SELECTION_6:
|
||||
Image: '*\powerpnt.exe'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and (SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6))
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 3ee1bba8-b9e2-4e35-bec5-7fb66b6b3815
|
||||
level: high
|
||||
logsource:
|
||||
category: edr
|
||||
product: windows
|
||||
modified: 2021/11/09
|
||||
references:
|
||||
- https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/
|
||||
- https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/main/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.t1204.002
|
||||
- attack.t1047
|
||||
- attack.t1218.010
|
||||
- attack.execution
|
||||
- attack.defense_evasion
|
||||
yml_filename: edr_command_execution_by_office_applications.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/edr
|
||||
|
||||
35
rules/Sigma/file_event_advanced_ip_scanner.yml
Normal file
35
rules/Sigma/file_event_advanced_ip_scanner.yml
Normal file
@@ -0,0 +1,35 @@
|
||||
title: Advanced IP Scanner
|
||||
author: '@ROxPinTeddy'
|
||||
date: 2020/05/12
|
||||
description: Detects the use of Advanced IP Scanner. Seems to be a popular tool for
|
||||
ransomware groups.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_2:
|
||||
TargetFilename: '*\AppData\Local\Temp\Advanced IP Scanner 2*'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- Legitimate administrative use
|
||||
id: fed85bf9-e075-4280-9159-fbe8a023d6fa
|
||||
level: medium
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
modified: 2021/09/11
|
||||
references:
|
||||
- https://news.sophos.com/en-us/2019/12/09/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection/
|
||||
- https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html
|
||||
- https://labs.f-secure.com/blog/prelude-to-ransomware-systembc
|
||||
- https://assets.documentcloud.org/documents/20444693/fbi-pin-egregor-ransomware-bc-01062021.pdf
|
||||
- https://thedfirreport.com/2021/01/18/all-that-for-a-coinminer
|
||||
related:
|
||||
- id: bef37fa2-f205-4a7b-b484-0759bfd5f86f
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.discovery
|
||||
- attack.t1046
|
||||
yml_filename: file_event_advanced_ip_scanner.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
31
rules/Sigma/file_event_apt_unidentified_nov_18.yml
Normal file
31
rules/Sigma/file_event_apt_unidentified_nov_18.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Unidentified Attacker November 2018
|
||||
author: '@41thexplorer, Microsoft Defender ATP'
|
||||
date: 2018/11/20
|
||||
description: A sigma rule detecting an unidetefied attacker who used phishing emails
|
||||
to target high profile orgs on November 2018. The Actor shares some TTPs with
|
||||
YYTRIUM/APT29 campaign in 2016.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_2:
|
||||
TargetFilename: '*ds7002.lnk*'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
id: 3a3f81ca-652c-482b-adeb-b1c804727f74
|
||||
level: high
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
modified: 2021/09/19
|
||||
references:
|
||||
- https://twitter.com/DrunkBinary/status/1063075530180886529
|
||||
related:
|
||||
- id: 7453575c-a747-40b9-839b-125a0aae324b
|
||||
type: derived
|
||||
status: stable
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1218.011
|
||||
- attack.t1085
|
||||
yml_filename: file_event_apt_unidentified_nov_18.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
@@ -0,0 +1,52 @@
|
||||
title: CVE-2021-31979 CVE-2021-33771 Exploits by Sourgum
|
||||
author: Sittikorn S
|
||||
date: 2021/07/16
|
||||
description: Detects patterns as noticed in exploitation of Windows CVE-2021-31979
|
||||
CVE-2021-33771 vulnerability and DevilsTongue malware by threat group Sourgum
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_10:
|
||||
TargetFilename: '*C:\Windows\system32\ime\IMEJP\WimBootConfigurations.ini*'
|
||||
SELECTION_11:
|
||||
TargetFilename: '*C:\Windows\system32\ime\IMETC\WimBootConfigurations.ini*'
|
||||
SELECTION_2:
|
||||
TargetFilename: '*C:\Windows\system32\physmem.sys*'
|
||||
SELECTION_3:
|
||||
TargetFilename: '*C:\Windows\System32\IME\IMEJP\imjpueact.dll*'
|
||||
SELECTION_4:
|
||||
TargetFilename: '*C:\Windows\system32\ime\IMETC\IMTCPROT.DLL*'
|
||||
SELECTION_5:
|
||||
TargetFilename: '*C:\Windows\system32\ime\SHARED\imecpmeid.dll*'
|
||||
SELECTION_6:
|
||||
TargetFilename: '*C:\Windows\system32\config\spp\ServiceState\Recovery\pac.dat*'
|
||||
SELECTION_7:
|
||||
TargetFilename: '*C:\Windows\system32\config\cy-GB\Setup\SKB\InputMethod\TupTask.dat*'
|
||||
SELECTION_8:
|
||||
TargetFilename: '*C:\Windows\system32\config\config\startwus.dat*'
|
||||
SELECTION_9:
|
||||
TargetFilename: '*C:\Windows\system32\ime\SHARED\WimBootConfigurations.ini*'
|
||||
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10
|
||||
or SELECTION_11))
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
id: ad7085ac-92e4-4b76-8ce2-276d2c0e68ef
|
||||
level: critical
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
modified: 2021/09/09
|
||||
references:
|
||||
- https://www.microsoft.com/security/blog/2021/07/15/protecting-customers-from-a-private-sector-offensive-actor-using-0-day-exploits-and-devilstongue-malware/
|
||||
- https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1566
|
||||
- attack.t1203
|
||||
- cve.2021.33771
|
||||
- cve.2021.31979
|
||||
yml_filename: file_event_cve_2021_31979_cve_2021_33771_exploits.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
33
rules/Sigma/file_event_hack_dumpert.yml
Normal file
33
rules/Sigma/file_event_hack_dumpert.yml
Normal file
@@ -0,0 +1,33 @@
|
||||
title: Dumpert Process Dumper
|
||||
author: Florian Roth
|
||||
date: 2020/02/04
|
||||
description: Detects the use of Dumpert process dumper, which dumps the lsass.exe
|
||||
process memory
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_2:
|
||||
TargetFilename: C:\Windows\Temp\dumpert.dmp
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- Very unlikely
|
||||
id: 93d94efc-d7ad-4161-ad7d-1638c4f908d8
|
||||
level: critical
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
modified: 2021/09/21
|
||||
references:
|
||||
- https://github.com/outflanknl/Dumpert
|
||||
- https://unit42.paloaltonetworks.com/actors-still-exploiting-sharepoint-vulnerability/
|
||||
related:
|
||||
- id: 2704ab9e-afe2-4854-a3b1-0c0706d03578
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
- attack.t1003.001
|
||||
yml_filename: file_event_hack_dumpert.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
31
rules/Sigma/file_event_hktl_createminidump.yml
Normal file
31
rules/Sigma/file_event_hktl_createminidump.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: CreateMiniDump Hacktool
|
||||
author: Florian Roth
|
||||
date: 2019/12/22
|
||||
description: Detects the use of CreateMiniDump hack tool used to dump the LSASS process
|
||||
memory for credential extraction on the attacker's machine
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_2:
|
||||
TargetFilename: '*\lsass.dmp'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: db2110f3-479d-42a6-94fb-d35bc1e46492
|
||||
level: high
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
modified: 2021/09/19
|
||||
references:
|
||||
- https://ired.team/offensive-security/credential-access-and-credential-dumping/dumping-lsass-passwords-without-mimikatz-minidumpwritedump-av-signature-bypass
|
||||
related:
|
||||
- id: 36d88494-1d43-4dc0-b3fa-35c8fea0ca9d
|
||||
type: derived
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003.001
|
||||
- attack.t1003
|
||||
yml_filename: file_event_hktl_createminidump.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
38
rules/Sigma/file_event_mal_adwind.yml
Normal file
38
rules/Sigma/file_event_mal_adwind.yml
Normal file
@@ -0,0 +1,38 @@
|
||||
title: Adwind RAT / JRAT
|
||||
author: Florian Roth, Tom Ueltschi, Jonhnathan Ribeiro, oscd.community
|
||||
date: 2017/11/10
|
||||
description: Detects javaw.exe in AppData folder as used by Adwind / JRAT
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_2:
|
||||
TargetFilename: '*\AppData\Roaming\Oracle\bin\java*'
|
||||
SELECTION_3:
|
||||
TargetFilename: '*.exe*'
|
||||
SELECTION_4:
|
||||
TargetFilename: '*\Retrive*'
|
||||
SELECTION_5:
|
||||
TargetFilename: '*.vbs*'
|
||||
condition: (SELECTION_1 and ((SELECTION_2 and SELECTION_3) or (SELECTION_4 and
|
||||
SELECTION_5)))
|
||||
id: 0bcfabcb-7929-47f4-93d6-b33fb67d34d1
|
||||
level: high
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
modified: 2021/09/19
|
||||
references:
|
||||
- https://www.hybrid-analysis.com/sample/ba86fa0d4b6af2db0656a88b1dd29f36fe362473ae8ad04255c4e52f214a541c?environmentId=100
|
||||
- https://www.first.org/resources/papers/conf2017/Advanced-Incident-Detection-and-Threat-Hunting-using-Sysmon-and-Splunk.pdf
|
||||
related:
|
||||
- id: 1fac1481-2dbc-48b2-9096-753c49b4ec71
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.005
|
||||
- attack.t1059.007
|
||||
- attack.t1064
|
||||
yml_filename: file_event_mal_adwind.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
28
rules/Sigma/file_event_mal_octopus_scanner.yml
Normal file
28
rules/Sigma/file_event_mal_octopus_scanner.yml
Normal file
@@ -0,0 +1,28 @@
|
||||
title: Octopus Scanner Malware
|
||||
author: NVISO
|
||||
date: 2020/06/09
|
||||
description: Detects Octopus Scanner Malware.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_2:
|
||||
TargetFilename: '*\AppData\Local\Microsoft\Cache134.dat'
|
||||
SELECTION_3:
|
||||
TargetFilename: '*\AppData\Local\Microsoft\ExplorerSync.db'
|
||||
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3))
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 805c55d9-31e6-4846-9878-c34c75054fe9
|
||||
level: high
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
references:
|
||||
- https://securitylab.github.com/research/octopus-scanner-malware-open-source-supply-chain
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.t1195
|
||||
- attack.t1195.001
|
||||
yml_filename: file_event_mal_octopus_scanner.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/malware
|
||||
|
||||
49
rules/Sigma/file_event_mal_vhd_download.yml
Normal file
49
rules/Sigma/file_event_mal_vhd_download.yml
Normal file
@@ -0,0 +1,49 @@
|
||||
title: Suspicious VHD Image Download From Browser
|
||||
author: frack113, Christopher Peacock '@securepeacock', SCYTHE '@scythe_io'
|
||||
date: 2021/10/25
|
||||
description: Malware can use mountable Virtual Hard Disk .vhd file to encapsulate
|
||||
payloads and evade security controls
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_10:
|
||||
TargetFilename: '*.vhd*'
|
||||
SELECTION_2:
|
||||
Image: '*chrome.exe'
|
||||
SELECTION_3:
|
||||
Image: '*firefox.exe'
|
||||
SELECTION_4:
|
||||
Image: '*microsoftedge.exe'
|
||||
SELECTION_5:
|
||||
Image: '*microsoftedgecp.exe'
|
||||
SELECTION_6:
|
||||
Image: '*msedge.exe'
|
||||
SELECTION_7:
|
||||
Image: '*iexplorer.exe'
|
||||
SELECTION_8:
|
||||
Image: '*brave.exe'
|
||||
SELECTION_9:
|
||||
Image: '*opera.exe'
|
||||
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9) and SELECTION_10)
|
||||
falsepositives:
|
||||
- Legitimate user creation
|
||||
id: 8468111a-ef07-4654-903b-b863a80bbc95
|
||||
level: medium
|
||||
logsource:
|
||||
category: file_event
|
||||
definition: in sysmon add "<TargetFilename condition="end with">.vhd</TargetFilename>
|
||||
<!--vhd files for ZLoader and lazarus malware vectors -->"
|
||||
product: windows
|
||||
modified: 2021/10/29
|
||||
references:
|
||||
- https://redcanary.com/blog/intelligence-insights-october-2021/
|
||||
- https://www.kaspersky.com/blog/lazarus-vhd-ransomware/36559/
|
||||
- https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
|
||||
status: test
|
||||
tags:
|
||||
- attack.resource_development
|
||||
- attack.t1587.001
|
||||
yml_filename: file_event_mal_vhd_download.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
27
rules/Sigma/file_event_mimikatz_kirbi_file_creation.yml
Normal file
27
rules/Sigma/file_event_mimikatz_kirbi_file_creation.yml
Normal file
@@ -0,0 +1,27 @@
|
||||
title: Mimikatz Kirbi File Creation
|
||||
author: Florian Roth
|
||||
date: 2021/11/08
|
||||
description: Detects the creation of files that contain Kerberos tickets based on
|
||||
an extension used by the popular tool Mimikatz
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_2:
|
||||
TargetFilename: '*.kirbi'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
id: 9e099d99-44c2-42b6-a6d8-54c3545cab29
|
||||
level: critical
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
references:
|
||||
- https://cobalt.io/blog/kerberoast-attack-techniques
|
||||
status: test
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1558
|
||||
yml_filename: file_event_mimikatz_kirbi_file_creation.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
32
rules/Sigma/file_event_moriya_rootkit.yml
Normal file
32
rules/Sigma/file_event_moriya_rootkit.yml
Normal file
@@ -0,0 +1,32 @@
|
||||
title: Moriya Rootkit
|
||||
author: Bhabesh Raj
|
||||
date: 2021/05/06
|
||||
description: Detects the use of Moriya rootkit as described in the securelist's Operation
|
||||
TunnelSnake report
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_2:
|
||||
TargetFilename: C:\Windows\System32\drivers\MoriyaStreamWatchmen.sys
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- None
|
||||
id: a1507d71-0b60-44f6-b17c-bf53220fdd88
|
||||
level: critical
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
modified: 2021/09/21
|
||||
references:
|
||||
- https://securelist.com/operation-tunnelsnake-and-moriya-rootkit/101831
|
||||
related:
|
||||
- id: 25b9c01c-350d-4b95-bed1-836d04a4f324
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.privilege_escalation
|
||||
- attack.t1543.003
|
||||
yml_filename: file_event_moriya_rootkit.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
31
rules/Sigma/file_event_pingback_backdoor.yml
Normal file
31
rules/Sigma/file_event_pingback_backdoor.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Pingback Backdoor
|
||||
author: Bhabesh Raj
|
||||
date: 2021/05/05
|
||||
description: Detects the use of Pingback backdoor that creates ICMP tunnel for C2
|
||||
as described in the trustwave report
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_2:
|
||||
Image: '*updata.exe'
|
||||
SELECTION_3:
|
||||
TargetFilename: C:\Windows\oci.dll
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Very unlikely
|
||||
id: 2bd63d53-84d4-4210-80ff-bf0658f1bf78
|
||||
level: high
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
modified: 2021/09/09
|
||||
references:
|
||||
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/backdoor-at-the-end-of-the-icmp-tunnel
|
||||
- https://app.any.run/tasks/4a54c651-b70b-4b72-84d7-f34d301d6406
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.t1574.001
|
||||
yml_filename: file_event_pingback_backdoor.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
@@ -0,0 +1,59 @@
|
||||
title: Created Files by Office Applications
|
||||
author: Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule)
|
||||
date: 2021/08/23
|
||||
description: This rule will monitor executable and script file creation by office
|
||||
applications. Please add more file extensions or magic bytes to the logic of your
|
||||
choice.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_10:
|
||||
TargetFilename: '*.vbs'
|
||||
SELECTION_11:
|
||||
TargetFilename: '*.sys'
|
||||
SELECTION_12:
|
||||
TargetFilename: '*.bat'
|
||||
SELECTION_13:
|
||||
TargetFilename: '*.scr'
|
||||
SELECTION_14:
|
||||
TargetFilename: '*.proj'
|
||||
SELECTION_2:
|
||||
Image: '*winword.exe'
|
||||
SELECTION_3:
|
||||
Image: '*excel.exe'
|
||||
SELECTION_4:
|
||||
Image: '*powerpnt.exe'
|
||||
SELECTION_5:
|
||||
TargetFilename: '*.exe'
|
||||
SELECTION_6:
|
||||
TargetFilename: '*.dll'
|
||||
SELECTION_7:
|
||||
TargetFilename: '*.ocx'
|
||||
SELECTION_8:
|
||||
TargetFilename: '*.com'
|
||||
SELECTION_9:
|
||||
TargetFilename: '*.ps1'
|
||||
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3 or SELECTION_4) and (SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10
|
||||
or SELECTION_11 or SELECTION_12 or SELECTION_13 or SELECTION_14))
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: c7a74c80-ba5a-486e-9974-ab9e682bc5e4
|
||||
level: high
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
modified: 2021/11/10
|
||||
references:
|
||||
- https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/
|
||||
- https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/main/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.t1204.002
|
||||
- attack.t1047
|
||||
- attack.t1218.010
|
||||
- attack.execution
|
||||
- attack.defense_evasion
|
||||
yml_filename: file_event_script_creation_by_office_using_file_ext.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
42
rules/Sigma/file_event_tool_psexec.yml
Normal file
42
rules/Sigma/file_event_tool_psexec.yml
Normal file
@@ -0,0 +1,42 @@
|
||||
title: PsExec Tool Execution
|
||||
author: Thomas Patzke
|
||||
date: 2017/06/12
|
||||
description: Detects PsExec service installation and execution events (service and
|
||||
Sysmon)
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_2:
|
||||
TargetFilename: '*\PSEXESVC.exe'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- unknown
|
||||
fields:
|
||||
- EventID
|
||||
- CommandLine
|
||||
- ParentCommandLine
|
||||
- ServiceName
|
||||
- ServiceFileName
|
||||
- TargetFilename
|
||||
- PipeName
|
||||
id: 259e5a6a-b8d2-4c38-86e2-26c5e651361d
|
||||
level: low
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
modified: 2021/09/21
|
||||
references:
|
||||
- https://www.jpcert.or.jp/english/pub/sr/ir_research.html
|
||||
- https://jpcertcc.github.io/ToolAnalysisResultSheet
|
||||
related:
|
||||
- id: 42c575ea-e41e-41f1-b248-8093c3e82a28
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1035
|
||||
- attack.t1569.002
|
||||
- attack.s0029
|
||||
yml_filename: file_event_tool_psexec.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
32
rules/Sigma/file_event_uac_bypass_winsat.yml
Normal file
32
rules/Sigma/file_event_uac_bypass_winsat.yml
Normal file
@@ -0,0 +1,32 @@
|
||||
title: UAC Bypass Abusing Winsat Path Parsing - File
|
||||
author: Christian Burkard
|
||||
date: 2021/08/30
|
||||
description: Detects the pattern of UAC Bypass using a path parsing issue in winsat.exe
|
||||
(UACMe 52)
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_2:
|
||||
TargetFilename: C:\Users\\*
|
||||
SELECTION_3:
|
||||
TargetFilename: '*\AppData\Local\Temp\system32\winsat.exe'
|
||||
SELECTION_4:
|
||||
TargetFilename: '*\AppData\Local\Temp\system32\winmm.dll'
|
||||
condition: (SELECTION_1 and SELECTION_2 and (SELECTION_3 or SELECTION_4))
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 155dbf56-e0a4-4dd0-8905-8a98705045e8
|
||||
level: high
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
references:
|
||||
- https://github.com/hfiref0x/UACME
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.privilege_escalation
|
||||
- attack.t1548.002
|
||||
yml_filename: file_event_uac_bypass_winsat.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
35
rules/Sigma/file_event_uac_bypass_wmp.yml
Normal file
35
rules/Sigma/file_event_uac_bypass_wmp.yml
Normal file
@@ -0,0 +1,35 @@
|
||||
title: UAC Bypass Using Windows Media Player - File
|
||||
author: Christian Burkard
|
||||
date: 2021/08/23
|
||||
description: Detects the pattern of UAC Bypass using Windows Media Player osksupport.dll
|
||||
(UACMe 32)
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_2:
|
||||
TargetFilename: C:\Users\\*
|
||||
SELECTION_3:
|
||||
TargetFilename: '*\AppData\Local\Temp\OskSupport.dll'
|
||||
SELECTION_4:
|
||||
Image: C:\Windows\system32\DllHost.exe
|
||||
SELECTION_5:
|
||||
TargetFilename: C:\Program Files\Windows Media Player\osk.exe
|
||||
condition: (SELECTION_1 and ((SELECTION_2 and SELECTION_3) or (SELECTION_4 and
|
||||
SELECTION_5)))
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 68578b43-65df-4f81-9a9b-92f32711a951
|
||||
level: high
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
references:
|
||||
- https://github.com/hfiref0x/UACME
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.privilege_escalation
|
||||
- attack.t1548.002
|
||||
yml_filename: file_event_uac_bypass_wmp.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
38
rules/Sigma/file_event_winrm_awl_bypass.yml
Normal file
38
rules/Sigma/file_event_winrm_awl_bypass.yml
Normal file
@@ -0,0 +1,38 @@
|
||||
title: AWL Bypass with Winrm.vbs and Malicious WsmPty.xsl/WsmTxt.xsl
|
||||
author: Julia Fomina, oscd.community
|
||||
date: 2020/10/06
|
||||
description: Detects execution of attacker-controlled WsmPty.xsl or WsmTxt.xsl via
|
||||
winrm.vbs and copied cscript.exe (can be renamed)
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_2:
|
||||
TargetFilename: '*WsmPty.xsl'
|
||||
SELECTION_3:
|
||||
TargetFilename: '*WsmTxt.xsl'
|
||||
SELECTION_4:
|
||||
TargetFilename: C:\Windows\System32\\*
|
||||
SELECTION_5:
|
||||
TargetFilename: C:\Windows\SysWOW64\\*
|
||||
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3) and not ((SELECTION_4
|
||||
or SELECTION_5)))
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
id: d353dac0-1b41-46c2-820c-d7d2561fc6ed
|
||||
level: medium
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
modified: 2021/09/19
|
||||
references:
|
||||
- https://posts.specterops.io/application-whitelisting-bypass-and-arbitrary-unsigned-code-execution-technique-in-winrm-vbs-c8c24fb40404
|
||||
related:
|
||||
- id: 074e0ded-6ced-4ebd-8b4d-53f55908119
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1216
|
||||
yml_filename: file_event_winrm_awl_bypass.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
32
rules/Sigma/file_event_wmiprvse_wbemcomn_dll_hijack.yml
Normal file
32
rules/Sigma/file_event_wmiprvse_wbemcomn_dll_hijack.yml
Normal file
@@ -0,0 +1,32 @@
|
||||
title: Wmiprvse Wbemcomn DLL Hijack
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
date: 2020/10/12
|
||||
description: Detects a threat actor creating a file named `wbemcomn.dll` in the `C:\Windows\System32\wbem\`
|
||||
directory over the network and loading it for a WMI DLL Hijack scenario.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 11
|
||||
SELECTION_2:
|
||||
Image: System
|
||||
SELECTION_3:
|
||||
TargetFilename: '*\wbem\wbemcomn.dll'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 614a7e17-5643-4d89-b6fe-f9df1a79641c
|
||||
level: critical
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
modified: 2021/09/09
|
||||
references:
|
||||
- https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/WIN-201009173318.html
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1047
|
||||
- attack.lateral_movement
|
||||
- attack.t1021.002
|
||||
yml_filename: file_event_wmiprvse_wbemcomn_dll_hijack.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event
|
||||
|
||||
31
rules/Sigma/image_load_pingback_backdoor.yml
Normal file
31
rules/Sigma/image_load_pingback_backdoor.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Pingback Backdoor
|
||||
author: Bhabesh Raj
|
||||
date: 2021/05/05
|
||||
description: Detects the use of Pingback backdoor that creates ICMP tunnel for C2
|
||||
as described in the trustwave report
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image: '*msdtc.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded: C:\Windows\oci.dll
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Very unlikely
|
||||
id: 35a7dc42-bc6f-46e0-9f83-81f8e56c8d4b
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/09/09
|
||||
references:
|
||||
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/backdoor-at-the-end-of-the-icmp-tunnel
|
||||
- https://app.any.run/tasks/4a54c651-b70b-4b72-84d7-f34d301d6406
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.t1574.001
|
||||
yml_filename: image_load_pingback_backdoor.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/image_load
|
||||
|
||||
29
rules/Sigma/image_load_silenttrinity_stage_use.yml
Normal file
29
rules/Sigma/image_load_silenttrinity_stage_use.yml
Normal file
@@ -0,0 +1,29 @@
|
||||
title: SILENTTRINITY Stager Execution
|
||||
author: Aleksey Potapov, oscd.community
|
||||
date: 2019/10/22
|
||||
description: Detects SILENTTRINITY stager use
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Description: '*st2stager*'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- unknown
|
||||
id: 75c505b1-711d-4f68-a357-8c3fe37dbf2d
|
||||
level: high
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/10/04
|
||||
references:
|
||||
- https://github.com/byt3bl33d3r/SILENTTRINITY
|
||||
related:
|
||||
- id: 03552375-cc2c-4883-bbe4-7958d5a980be
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.command_and_control
|
||||
yml_filename: image_load_silenttrinity_stage_use.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/image_load
|
||||
|
||||
32
rules/Sigma/image_load_wmiprvse_wbemcomn_dll_hijack.yml
Normal file
32
rules/Sigma/image_load_wmiprvse_wbemcomn_dll_hijack.yml
Normal file
@@ -0,0 +1,32 @@
|
||||
title: Wmiprvse Wbemcomn DLL Hijack
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
date: 2020/10/12
|
||||
description: Detects a threat actor creating a file named `wbemcomn.dll` in the `C:\Windows\System32\wbem\`
|
||||
directory over the network and loading it for a WMI DLL Hijack scenario.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Image: '*\wmiprvse.exe'
|
||||
SELECTION_3:
|
||||
ImageLoaded: '*\wbem\wbemcomn.dll'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 7707a579-e0d8-4886-a853-ce47e4575aaa
|
||||
level: critical
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/09/09
|
||||
references:
|
||||
- https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/WIN-201009173318.html
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1047
|
||||
- attack.lateral_movement
|
||||
- attack.t1021.002
|
||||
yml_filename: image_load_wmiprvse_wbemcomn_dll_hijack.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/image_load
|
||||
|
||||
50
rules/Sigma/pipe_created_tool_psexec.yml
Normal file
50
rules/Sigma/pipe_created_tool_psexec.yml
Normal file
@@ -0,0 +1,50 @@
|
||||
title: PsExec Tool Execution
|
||||
author: Thomas Patzke
|
||||
date: 2017/06/12
|
||||
description: Detects PsExec service installation and execution events (service and
|
||||
Sysmon)
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 17
|
||||
SELECTION_2:
|
||||
EventID: 18
|
||||
SELECTION_3:
|
||||
PipeName: \PSEXESVC
|
||||
condition: ((SELECTION_1 or SELECTION_2) and SELECTION_3)
|
||||
falsepositives:
|
||||
- unknown
|
||||
fields:
|
||||
- EventID
|
||||
- CommandLine
|
||||
- ParentCommandLine
|
||||
- ServiceName
|
||||
- ServiceFileName
|
||||
- TargetFilename
|
||||
- PipeName
|
||||
id: f3f3a972-f982-40ad-b63c-bca6afdfad7c
|
||||
level: low
|
||||
logsource:
|
||||
category: pipe_created
|
||||
definition: Note that you have to configure logging for Named Pipe Events in Sysmon
|
||||
config (Event ID 17 and Event ID 18). The basic configuration is in popular
|
||||
sysmon configuration (https://github.com/SwiftOnSecurity/sysmon-config), but
|
||||
it is worth verifying. You can also use other repo, e.g. https://github.com/Neo23x0/sysmon-config,
|
||||
https://github.com/olafhartong/sysmon-modular. How to test detection? You
|
||||
can check powershell script from this site https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575
|
||||
product: windows
|
||||
modified: 2021/09/21
|
||||
references:
|
||||
- https://www.jpcert.or.jp/english/pub/sr/ir_research.html
|
||||
- https://jpcertcc.github.io/ToolAnalysisResultSheet
|
||||
related:
|
||||
- id: 42c575ea-e41e-41f1-b248-8093c3e82a28
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1035
|
||||
- attack.t1569.002
|
||||
- attack.s0029
|
||||
yml_filename: pipe_created_tool_psexec.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/pipe_created
|
||||
|
||||
128
rules/Sigma/powershell_accessing_win_api.yml
Normal file
128
rules/Sigma/powershell_accessing_win_api.yml
Normal file
@@ -0,0 +1,128 @@
|
||||
title: Accessing WinAPI in PowerShell
|
||||
author: Nikita Nazarov, oscd.community
|
||||
date: 2020/10/06
|
||||
description: Detecting use WinAPI Functions in PowerShell
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*WaitForSingleObject*'
|
||||
SELECTION_10:
|
||||
ScriptBlockText: '*GetDelegateForFunctionPointer*'
|
||||
SELECTION_11:
|
||||
ScriptBlockText: '*CreateThread*'
|
||||
SELECTION_12:
|
||||
ScriptBlockText: '*memcpy*'
|
||||
SELECTION_13:
|
||||
ScriptBlockText: '*LoadLibrary*'
|
||||
SELECTION_14:
|
||||
ScriptBlockText: '*GetModuleHandle*'
|
||||
SELECTION_15:
|
||||
ScriptBlockText: '*GetProcAddress*'
|
||||
SELECTION_16:
|
||||
ScriptBlockText: '*VirtualProtect*'
|
||||
SELECTION_17:
|
||||
ScriptBlockText: '*FreeLibrary*'
|
||||
SELECTION_18:
|
||||
ScriptBlockText: '*ReadProcessMemory*'
|
||||
SELECTION_19:
|
||||
ScriptBlockText: '*CreateRemoteThread*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*QueueUserApc*'
|
||||
SELECTION_20:
|
||||
ScriptBlockText: '*AdjustTokenPrivileges*'
|
||||
SELECTION_21:
|
||||
ScriptBlockText: '*WriteByte*'
|
||||
SELECTION_22:
|
||||
ScriptBlockText: '*WriteInt32*'
|
||||
SELECTION_23:
|
||||
ScriptBlockText: '*OpenThreadToken*'
|
||||
SELECTION_24:
|
||||
ScriptBlockText: '*PtrToString*'
|
||||
SELECTION_25:
|
||||
ScriptBlockText: '*FreeHGlobal*'
|
||||
SELECTION_26:
|
||||
ScriptBlockText: '*ZeroFreeGlobalAllocUnicode*'
|
||||
SELECTION_27:
|
||||
ScriptBlockText: '*OpenProcessToken*'
|
||||
SELECTION_28:
|
||||
ScriptBlockText: '*GetTokenInformation*'
|
||||
SELECTION_29:
|
||||
ScriptBlockText: '*SetThreadToken*'
|
||||
SELECTION_3:
|
||||
ScriptBlockText: '*RtlCreateUserThread*'
|
||||
SELECTION_30:
|
||||
ScriptBlockText: '*ImpersonateLoggedOnUser*'
|
||||
SELECTION_31:
|
||||
ScriptBlockText: '*RevertToSelf*'
|
||||
SELECTION_32:
|
||||
ScriptBlockText: '*GetLogonSessionData*'
|
||||
SELECTION_33:
|
||||
ScriptBlockText: '*CreateProcessWithToken*'
|
||||
SELECTION_34:
|
||||
ScriptBlockText: '*DuplicateTokenEx*'
|
||||
SELECTION_35:
|
||||
ScriptBlockText: '*OpenWindowStation*'
|
||||
SELECTION_36:
|
||||
ScriptBlockText: '*OpenDesktop*'
|
||||
SELECTION_37:
|
||||
ScriptBlockText: '*MiniDumpWriteDump*'
|
||||
SELECTION_38:
|
||||
ScriptBlockText: '*AddSecurityPackage*'
|
||||
SELECTION_39:
|
||||
ScriptBlockText: '*EnumerateSecurityPackages*'
|
||||
SELECTION_4:
|
||||
ScriptBlockText: '*OpenProcess*'
|
||||
SELECTION_40:
|
||||
ScriptBlockText: '*GetProcessHandle*'
|
||||
SELECTION_41:
|
||||
ScriptBlockText: '*DangerousGetHandle*'
|
||||
SELECTION_42:
|
||||
ScriptBlockText: '*kernel32*'
|
||||
SELECTION_43:
|
||||
ScriptBlockText: '*Advapi32*'
|
||||
SELECTION_44:
|
||||
ScriptBlockText: '*msvcrt*'
|
||||
SELECTION_45:
|
||||
ScriptBlockText: '*ntdll*'
|
||||
SELECTION_46:
|
||||
ScriptBlockText: '*user32*'
|
||||
SELECTION_47:
|
||||
ScriptBlockText: '*secur32*'
|
||||
SELECTION_5:
|
||||
ScriptBlockText: '*VirtualAlloc*'
|
||||
SELECTION_6:
|
||||
ScriptBlockText: '*VirtualFree*'
|
||||
SELECTION_7:
|
||||
ScriptBlockText: '*WriteProcessMemory*'
|
||||
SELECTION_8:
|
||||
ScriptBlockText: '*CreateUserThread*'
|
||||
SELECTION_9:
|
||||
ScriptBlockText: '*CloseHandle*'
|
||||
condition: (SELECTION_1 or SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10
|
||||
or SELECTION_11 or SELECTION_12 or SELECTION_13 or SELECTION_14 or SELECTION_15
|
||||
or SELECTION_16 or SELECTION_17 or SELECTION_18 or SELECTION_19 or SELECTION_20
|
||||
or SELECTION_21 or SELECTION_22 or SELECTION_23 or SELECTION_24 or SELECTION_25
|
||||
or SELECTION_26 or SELECTION_27 or SELECTION_28 or SELECTION_29 or SELECTION_30
|
||||
or SELECTION_31 or SELECTION_32 or SELECTION_33 or SELECTION_34 or SELECTION_35
|
||||
or SELECTION_36 or SELECTION_37 or SELECTION_38 or SELECTION_39 or SELECTION_40
|
||||
or SELECTION_41 or SELECTION_42 or SELECTION_43 or SELECTION_44 or SELECTION_45
|
||||
or SELECTION_46 or SELECTION_47)
|
||||
falsepositives:
|
||||
- Carbon PowerShell Module (https://github.com/webmd-health-services/Carbon)
|
||||
id: 03d83090-8cba-44a0-b02f-0b756a050306
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1106
|
||||
yml_filename: powershell_accessing_win_api.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
31
rules/Sigma/powershell_adrecon_execution.yml
Normal file
31
rules/Sigma/powershell_adrecon_execution.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: PowerShell ADRecon Execution
|
||||
author: Bhabesh Raj
|
||||
date: 2021/07/16
|
||||
description: Detects execution of ADRecon.ps1 for AD reconnaissance which has been
|
||||
reported to be actively used by FIN7
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*Function Get-ADRExcelComOb*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*ADRecon-Report.xlsx*'
|
||||
condition: (SELECTION_1 or SELECTION_2)
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: bf72941a-cba0-41ea-b18c-9aca3925690d
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/sense-of-security/ADRecon
|
||||
- https://bi-zone.medium.com/from-pentest-to-apt-attack-cybercriminal-group-fin7-disguises-its-malware-as-an-ethical-hackers-c23c9a75e319
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.discovery
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_adrecon_execution.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
32
rules/Sigma/powershell_alternate_powershell_hosts.yml
Normal file
32
rules/Sigma/powershell_alternate_powershell_hosts.yml
Normal file
@@ -0,0 +1,32 @@
|
||||
title: Alternate PowerShell Hosts
|
||||
author: Roberto Rodriguez @Cyb3rWard0g
|
||||
date: 2019/08/11
|
||||
description: Detects alternate PowerShell hosts potentially bypassing detections looking
|
||||
for powershell.exe
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ContextInfo: '*'
|
||||
SELECTION_2:
|
||||
ContextInfo: '*powershell.exe*'
|
||||
condition: (SELECTION_1 and not (SELECTION_2))
|
||||
falsepositives:
|
||||
- Programs using PowerShell directly without invocation of a dedicated interpreter
|
||||
- MSP Detection Searcher
|
||||
- Citrix ConfigSync.ps1
|
||||
id: 64e8e417-c19a-475a-8d19-98ea705394cc
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190815181010.html
|
||||
status: test
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
yml_filename: powershell_alternate_powershell_hosts.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
51
rules/Sigma/powershell_automated_collection.yml
Normal file
51
rules/Sigma/powershell_automated_collection.yml
Normal file
@@ -0,0 +1,51 @@
|
||||
title: Automated Collection Command PowerShell
|
||||
author: frack113
|
||||
date: 2021/07/28
|
||||
description: Once established within a system or network, an adversary may use automated
|
||||
techniques for collecting internal data.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*.doc*'
|
||||
SELECTION_10:
|
||||
ScriptBlockText: '*Get-ChildItem*'
|
||||
SELECTION_11:
|
||||
ScriptBlockText: '* -Recurse *'
|
||||
SELECTION_12:
|
||||
ScriptBlockText: '* -Include *'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*.docx*'
|
||||
SELECTION_3:
|
||||
ScriptBlockText: '*.xls*'
|
||||
SELECTION_4:
|
||||
ScriptBlockText: '*.xlsx*'
|
||||
SELECTION_5:
|
||||
ScriptBlockText: '*.ppt*'
|
||||
SELECTION_6:
|
||||
ScriptBlockText: '*.pptx*'
|
||||
SELECTION_7:
|
||||
ScriptBlockText: '*.rtf*'
|
||||
SELECTION_8:
|
||||
ScriptBlockText: '*.pdf*'
|
||||
SELECTION_9:
|
||||
ScriptBlockText: '*.txt*'
|
||||
condition: ((SELECTION_1 or SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9) and SELECTION_10
|
||||
and SELECTION_11 and SELECTION_12)
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: c1dda054-d638-4c16-afc8-53e007f3fbc5
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1119/T1119.md
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.collection
|
||||
- attack.t1119
|
||||
yml_filename: powershell_automated_collection.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
32
rules/Sigma/powershell_azurehound_commands.yml
Normal file
32
rules/Sigma/powershell_azurehound_commands.yml
Normal file
@@ -0,0 +1,32 @@
|
||||
title: AzureHound PowerShell Commands
|
||||
author: Austin Songer (@austinsonger)
|
||||
date: 2021/10/23
|
||||
description: null
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*Invoke-AzureHound*'
|
||||
condition: (SELECTION_1)
|
||||
falsepositives:
|
||||
- Penetration testing
|
||||
id: 83083ac6-1816-4e76-97d7-59af9a9ae46e
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script Block Logging must be enable
|
||||
product: windows
|
||||
references:
|
||||
- https://github.com/BloodHoundAD/BloodHound/blob/master/Collectors/AzureHound.ps1
|
||||
- https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.discovery
|
||||
- attack.t1482
|
||||
- attack.t1087
|
||||
- attack.t1087.001
|
||||
- attack.t1087.002
|
||||
- attack.t1069.001
|
||||
- attack.t1069.002
|
||||
- attack.t1069
|
||||
yml_filename: powershell_azurehound_commands.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
47
rules/Sigma/powershell_bad_opsec_artifacts.yml
Normal file
47
rules/Sigma/powershell_bad_opsec_artifacts.yml
Normal file
@@ -0,0 +1,47 @@
|
||||
title: Bad Opsec Powershell Code Artifacts
|
||||
author: ok @securonix invrep_de, oscd.community
|
||||
date: 2020/10/09
|
||||
description: Focuses on trivial artifacts observed in variants of prevalent offensive
|
||||
ps1 payloads, including Cobalt Strike Beacon, PoshC2, Powerview, Letmein, Empire,
|
||||
Powersploit, and other attack payloads that often undergo minimal changes by attackers
|
||||
due to bad opsec.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Payload: '*$DoIt*'
|
||||
SELECTION_2:
|
||||
Payload: '*harmj0y*'
|
||||
SELECTION_3:
|
||||
Payload: '*mattifestation*'
|
||||
SELECTION_4:
|
||||
Payload: '*_RastaMouse*'
|
||||
SELECTION_5:
|
||||
Payload: '*tifkin_*'
|
||||
SELECTION_6:
|
||||
Payload: '*0xdeadbeef*'
|
||||
condition: (SELECTION_1 or SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6)
|
||||
falsepositives:
|
||||
- Moderate-to-low; Despite the shorter length/lower entropy for some of these, because
|
||||
of high specificity, fp appears to be fairly limited in many environments.
|
||||
id: 8d31a8ce-46b5-4dd6-bdc3-680931f1db86
|
||||
level: critical
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://newtonpaul.com/analysing-fileless-malware-cobalt-strike-beacon/
|
||||
- https://labs.sentinelone.com/top-tier-russian-organized-cybercrime-group-unveils-fileless-stealthy-powertrick-backdoor-for-high-value-targets/
|
||||
- https://www.mdeditor.tw/pl/pgRt
|
||||
related:
|
||||
- id: 73e733cc-1ace-3212-a107-ff2523cc9fc3
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
yml_filename: powershell_bad_opsec_artifacts.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
29
rules/Sigma/powershell_cl_invocation_lolscript.yml
Normal file
29
rules/Sigma/powershell_cl_invocation_lolscript.yml
Normal file
@@ -0,0 +1,29 @@
|
||||
title: Execution via CL_Invocation.ps1
|
||||
author: oscd.community, Natalia Shornikova
|
||||
date: 2020/10/14
|
||||
description: Detects Execution via SyncInvoke in CL_Invocation.ps1 module
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*CL_Invocation.ps1*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*SyncInvoke*'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 4cd29327-685a-460e-9dac-c3ab96e549dc
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSScripts/Cl_invocation.yml
|
||||
- https://twitter.com/bohops/status/948061991012327424
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1216
|
||||
yml_filename: powershell_cl_invocation_lolscript.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
30
rules/Sigma/powershell_cl_invocation_lolscript_count.yml
Normal file
30
rules/Sigma/powershell_cl_invocation_lolscript_count.yml
Normal file
@@ -0,0 +1,30 @@
|
||||
title: Execution via CL_Invocation.ps1 (2 Lines)
|
||||
author: oscd.community, Natalia Shornikova
|
||||
date: 2020/10/14
|
||||
description: Detects Execution via SyncInvoke in CL_Invocation.ps1 module
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*CL_Invocation.ps1*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*SyncInvoke*'
|
||||
condition: (SELECTION_1 or SELECTION_2)| count(ScriptBlockText) by Computer >
|
||||
2
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: f588e69b-0750-46bb-8f87-0e9320d57536
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSScripts/Cl_invocation.yml
|
||||
- https://twitter.com/bohops/status/948061991012327424
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1216
|
||||
yml_filename: powershell_cl_invocation_lolscript_count.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
30
rules/Sigma/powershell_cl_mutexverifiers_lolscript.yml
Normal file
30
rules/Sigma/powershell_cl_mutexverifiers_lolscript.yml
Normal file
@@ -0,0 +1,30 @@
|
||||
title: Execution via CL_Mutexverifiers.ps1
|
||||
author: oscd.community, Natalia Shornikova
|
||||
date: 2020/10/14
|
||||
description: Detects Execution via runAfterCancelProcess in CL_Mutexverifiers.ps1
|
||||
module
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*CL_Mutexverifiers.ps1*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*runAfterCancelProcess*'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 39776c99-1c7b-4ba0-b5aa-641525eee1a4
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSScripts/CL_mutexverifiers.yml
|
||||
- https://twitter.com/pabraeken/status/995111125447577600
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1216
|
||||
yml_filename: powershell_cl_mutexverifiers_lolscript.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
31
rules/Sigma/powershell_cl_mutexverifiers_lolscript_count.yml
Normal file
31
rules/Sigma/powershell_cl_mutexverifiers_lolscript_count.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Execution via CL_Mutexverifiers.ps1 (2 Lines)
|
||||
author: oscd.community, Natalia Shornikova
|
||||
date: 2020/10/14
|
||||
description: Detects Execution via runAfterCancelProcess in CL_Mutexverifiers.ps1
|
||||
module
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*CL_Mutexverifiers.ps1*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*runAfterCancelProcess*'
|
||||
condition: (SELECTION_1 or SELECTION_2)| count(ScriptBlockText) by Computer >
|
||||
2
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 6609c444-9670-4eab-9636-fe4755a851ce
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSScripts/CL_mutexverifiers.yml
|
||||
- https://twitter.com/pabraeken/status/995111125447577600
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1216
|
||||
yml_filename: powershell_cl_mutexverifiers_lolscript_count.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
@@ -0,0 +1,35 @@
|
||||
title: Alternate PowerShell Hosts
|
||||
author: Roberto Rodriguez @Cyb3rWard0g
|
||||
date: 2019/08/11
|
||||
description: Detects alternate PowerShell hosts potentially bypassing detections looking
|
||||
for powershell.exe
|
||||
detection:
|
||||
SELECTION_1:
|
||||
HostApplication: '*'
|
||||
SELECTION_2:
|
||||
HostApplication: C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe*
|
||||
condition: (SELECTION_1 and not (SELECTION_2))
|
||||
falsepositives:
|
||||
- Programs using PowerShell directly without invocation of a dedicated interpreter
|
||||
- MSP Detection Searcher
|
||||
- Citrix ConfigSync.ps1
|
||||
id: d7326048-328b-4d5e-98af-86e84b17c765
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_classic_start
|
||||
definition: fields have to be extract from event
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190815181010.html
|
||||
related:
|
||||
- id: 64e8e417-c19a-475a-8d19-98ea705394cc
|
||||
type: derived
|
||||
status: test
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
yml_filename: powershell_classic_alternate_powershell_hosts.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_classic
|
||||
|
||||
34
rules/Sigma/powershell_classic_powercat.yml
Normal file
34
rules/Sigma/powershell_classic_powercat.yml
Normal file
@@ -0,0 +1,34 @@
|
||||
title: Netcat The Powershell Version
|
||||
author: frack113
|
||||
date: 2021/07/21
|
||||
description: Adversaries may use a non-application layer protocol for communication
|
||||
between host and C2 server or among infected hosts within a network
|
||||
detection:
|
||||
SELECTION_1:
|
||||
HostApplication: '*powercat *'
|
||||
SELECTION_2:
|
||||
HostApplication: '*powercat.ps1*'
|
||||
condition: (SELECTION_1 or SELECTION_2)
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: c5b20776-639a-49bf-94c7-84f912b91c15
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_classic_start
|
||||
definition: fields have to be extract from event
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://nmap.org/ncat/
|
||||
- https://github.com/besimorhino/powercat
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1095/T1095.md
|
||||
related:
|
||||
- id: bf7286e7-c0be-460b-a7e8-5b2e07ecc2f2
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.command_and_control
|
||||
- attack.t1095
|
||||
yml_filename: powershell_classic_powercat.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_classic
|
||||
|
||||
35
rules/Sigma/powershell_classic_remote_powershell_session.yml
Normal file
35
rules/Sigma/powershell_classic_remote_powershell_session.yml
Normal file
@@ -0,0 +1,35 @@
|
||||
title: Remote PowerShell Session
|
||||
author: Roberto Rodriguez @Cyb3rWard0g
|
||||
date: 2019/08/10
|
||||
description: Detects remote PowerShell sessions
|
||||
detection:
|
||||
SELECTION_1:
|
||||
HostName: ServerRemoteHost
|
||||
SELECTION_2:
|
||||
HostApplication: '*wsmprovhost.exe*'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- Legitimate use remote PowerShell sessions
|
||||
id: 60167e5c-84b2-4c95-a7ac-86281f27c445
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_classic_start
|
||||
definition: fields have to be extract from event
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190511223310.html
|
||||
related:
|
||||
- id: 96b9f619-aa91-478f-bacb-c3e50f8df575
|
||||
type: derived
|
||||
status: test
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
- attack.lateral_movement
|
||||
- attack.t1021.006
|
||||
- attack.t1028
|
||||
yml_filename: powershell_classic_remote_powershell_session.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_classic
|
||||
|
||||
@@ -0,0 +1,44 @@
|
||||
title: Abusable Invoke-ATHRemoteFXvGPUDisablementCommand
|
||||
author: frack113
|
||||
date: 2021/07/13
|
||||
description: RemoteFXvGPUDisablement.exe is an abusable, signed PowerShell host executable
|
||||
that was introduced in Windows 10 and Server 2019 (OS Build 17763.1339).
|
||||
detection:
|
||||
SELECTION_1:
|
||||
HostApplication: '*Invoke-ATHRemoteFXvGPUDisablementCommand *'
|
||||
SELECTION_2:
|
||||
HostApplication: '*-ModuleName *'
|
||||
SELECTION_3:
|
||||
HostApplication: '*-ModulePath *'
|
||||
SELECTION_4:
|
||||
HostApplication: '*-ScriptBlock *'
|
||||
SELECTION_5:
|
||||
HostApplication: '*-RemoteFXvGPUDisablementFilePath*'
|
||||
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5))
|
||||
falsepositives:
|
||||
- Unknown
|
||||
fields:
|
||||
- ComputerName
|
||||
- User
|
||||
- CommandLine
|
||||
- ParentCommandLine
|
||||
id: f65e22f9-819e-4f96-9c7b-498364ae7a25
|
||||
level: medium
|
||||
logsource:
|
||||
definition: fields have to be extract from event
|
||||
product: windows
|
||||
service: powershell-classic
|
||||
modified: 2021/09/07
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1218/T1218.md
|
||||
- https://github.com/redcanaryco/AtomicTestHarnesses/blob/master/TestHarnesses/T1218_SignedBinaryProxyExecution/InvokeRemoteFXvGPUDisablementCommand.ps1
|
||||
related:
|
||||
- id: 38a7625e-b2cb-485d-b83d-aff137d859f4
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1218
|
||||
yml_filename: powershell_classic_susp_athremotefxvgpudisablementcommand.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_classic
|
||||
|
||||
36
rules/Sigma/powershell_classic_susp_zip_compress.yml
Normal file
36
rules/Sigma/powershell_classic_susp_zip_compress.yml
Normal file
@@ -0,0 +1,36 @@
|
||||
title: Zip A Folder With PowerShell For Staging In Temp
|
||||
author: frack113
|
||||
date: 2021/07/20
|
||||
description: Use living off the land tools to zip a file and stage it in the Windows
|
||||
temporary folder for later exfiltration
|
||||
detection:
|
||||
SELECTION_1:
|
||||
HostApplication: '*Compress-Archive *'
|
||||
SELECTION_2:
|
||||
HostApplication: '* -Path *'
|
||||
SELECTION_3:
|
||||
HostApplication: '* -DestinationPath *'
|
||||
SELECTION_4:
|
||||
HostApplication: '*$env:TEMP\\*'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 71ff406e-b633-4989-96ec-bc49d825a412
|
||||
level: medium
|
||||
logsource:
|
||||
definition: fields have to be extract from event
|
||||
product: windows
|
||||
service: powershell-classic
|
||||
modified: 2021/09/07
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1074.001/T1074.001.md
|
||||
related:
|
||||
- id: b7a3c9a3-09ea-4934-8864-6a32cacd98d9
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.collection
|
||||
- attack.t1074.001
|
||||
yml_filename: powershell_classic_susp_zip_compress.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_classic
|
||||
|
||||
32
rules/Sigma/powershell_classic_suspicious_download.yml
Normal file
32
rules/Sigma/powershell_classic_suspicious_download.yml
Normal file
@@ -0,0 +1,32 @@
|
||||
title: Suspicious PowerShell Download
|
||||
author: Florian Roth
|
||||
date: 2017/03/05
|
||||
description: Detects suspicious PowerShell download command
|
||||
detection:
|
||||
SELECTION_1:
|
||||
HostApplication: '*System.Net.WebClient*'
|
||||
SELECTION_2:
|
||||
HostApplication: '*.DownloadFile(*'
|
||||
SELECTION_3:
|
||||
HostApplication: '*.DownloadString(*'
|
||||
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3))
|
||||
falsepositives:
|
||||
- PowerShell scripts that download content from the Internet
|
||||
id: 3236fcd0-b7e3-4433-b4f8-86ad61a9af2d
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_classic_start
|
||||
definition: fields have to be extract from event
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
related:
|
||||
- id: 65531a81-a694-4e31-ae04-f8ba5bc33759
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
yml_filename: powershell_classic_suspicious_download.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_classic
|
||||
|
||||
43
rules/Sigma/powershell_clear_powershell_history.yml
Normal file
43
rules/Sigma/powershell_clear_powershell_history.yml
Normal file
@@ -0,0 +1,43 @@
|
||||
title: Clear PowerShell History
|
||||
author: Ilyas Ochkov, Jonhnathan Ribeiro, Daniil Yugoslavskiy, oscd.community
|
||||
date: 2019/10/25
|
||||
description: Detects keywords that could indicate clearing PowerShell history
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Payload: '*del*'
|
||||
SELECTION_2:
|
||||
Payload: '*Remove-Item*'
|
||||
SELECTION_3:
|
||||
Payload: '*rm*'
|
||||
SELECTION_4:
|
||||
Payload: '*(Get-PSReadlineOption).HistorySavePath*'
|
||||
SELECTION_5:
|
||||
Payload: '*Set-PSReadlineOption*'
|
||||
SELECTION_6:
|
||||
Payload: "*\u2013HistorySaveStyle*"
|
||||
SELECTION_7:
|
||||
Payload: '*SaveNothing*'
|
||||
condition: (((SELECTION_1 or SELECTION_2 or SELECTION_3) and SELECTION_4) or (SELECTION_5
|
||||
and SELECTION_6 and SELECTION_7))
|
||||
falsepositives:
|
||||
- Legitimate PowerShell scripts
|
||||
id: f99276ad-d122-4989-a09a-d00904a5f9d2
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://gist.github.com/hook-s3c/7363a856c3cdbadeb71085147f042c1a
|
||||
related:
|
||||
- id: dfba4ce1-e0ea-495f-986e-97140f31af2d
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1070.003
|
||||
- attack.t1146
|
||||
yml_filename: powershell_clear_powershell_history.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
30
rules/Sigma/powershell_create_local_user.yml
Normal file
30
rules/Sigma/powershell_create_local_user.yml
Normal file
@@ -0,0 +1,30 @@
|
||||
title: PowerShell Create Local User
|
||||
author: '@ROxPinTeddy'
|
||||
date: 2020/04/11
|
||||
description: Detects creation of a local user via PowerShell
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*New-LocalUser*'
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Legitimate user creation
|
||||
id: 243de76f-4725-4f2e-8225-a8a69b15ad61
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1136/T1136.md
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
- attack.persistence
|
||||
- attack.t1136.001
|
||||
- attack.t1136
|
||||
yml_filename: powershell_create_local_user.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
33
rules/Sigma/powershell_data_compressed.yml
Normal file
33
rules/Sigma/powershell_data_compressed.yml
Normal file
@@ -0,0 +1,33 @@
|
||||
title: Data Compressed - PowerShell
|
||||
author: Timur Zinniatullin, oscd.community
|
||||
date: 2019/10/21
|
||||
description: An adversary may compress data (e.g., sensitive documents) that is collected
|
||||
prior to exfiltration in order to make it portable and minimize the amount of
|
||||
data sent over the network.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*-Recurse*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*|*'
|
||||
SELECTION_3:
|
||||
ScriptBlockText: '*Compress-Archive*'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Highly likely if archive operations are done via PowerShell.
|
||||
id: 6dc5d284-69ea-42cf-9311-fb1c3932a69a
|
||||
level: low
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1560/T1560.md
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.exfiltration
|
||||
- attack.t1560
|
||||
- attack.t1002
|
||||
yml_filename: powershell_data_compressed.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
31
rules/Sigma/powershell_decompress_commands.yml
Normal file
31
rules/Sigma/powershell_decompress_commands.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: PowerShell Decompress Commands
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
date: 2020/05/02
|
||||
description: A General detection for specific decompress commands in PowerShell logs.
|
||||
This could be an adversary decompressing files.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Payload: '*Expand-Archive*'
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- unknown
|
||||
id: 1ddc1472-8e52-4f7d-9f11-eab14fc171f5
|
||||
level: informational
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/OTRF/detection-hackathon-apt29/issues/8
|
||||
- https://threathunterplaybook.com/evals/apt29/detections/4.A.3_09F29912-8E93-461E-9E89-3F06F6763383.html
|
||||
related:
|
||||
- id: 81fbdce6-ee49-485a-908d-1a728c5dcb09
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1140
|
||||
yml_filename: powershell_decompress_commands.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
37
rules/Sigma/powershell_delete_volume_shadow_copies.yml
Normal file
37
rules/Sigma/powershell_delete_volume_shadow_copies.yml
Normal file
@@ -0,0 +1,37 @@
|
||||
title: Delete Volume Shadow Copies Via WMI With PowerShell
|
||||
author: frack113
|
||||
date: 2021/06/03
|
||||
description: Shadow Copies deletion using operating systems utilities via PowerShell
|
||||
detection:
|
||||
SELECTION_1:
|
||||
HostApplication: '*Get-WmiObject*'
|
||||
SELECTION_2:
|
||||
HostApplication: '* Win32_Shadowcopy*'
|
||||
SELECTION_3:
|
||||
HostApplication: '*Delete()*'
|
||||
SELECTION_4:
|
||||
HostApplication: '*Remove-WmiObject*'
|
||||
condition: (SELECTION_1 and SELECTION_2 and (SELECTION_3 or SELECTION_4))
|
||||
falsepositives:
|
||||
- Legitimate Administrator deletes Shadow Copies using operating systems utilities
|
||||
for legitimate reason
|
||||
fields:
|
||||
- HostApplication
|
||||
id: 87df9ee1-5416-453a-8a08-e8d4a51e9ce1
|
||||
level: critical
|
||||
logsource:
|
||||
category: ps_classic_start
|
||||
definition: fields have to be extract from event
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1490/T1490.md
|
||||
- https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/win_shadow_copies_deletion.yml
|
||||
- https://www.fortinet.com/blog/threat-research/stomping-shadow-copies-a-second-look-into-deletion-methods
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.impact
|
||||
- attack.t1490
|
||||
yml_filename: powershell_delete_volume_shadow_copies.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_classic
|
||||
|
||||
34
rules/Sigma/powershell_detect_vm_env.yml
Normal file
34
rules/Sigma/powershell_detect_vm_env.yml
Normal file
@@ -0,0 +1,34 @@
|
||||
title: Powershell Detect Virtualization Environment
|
||||
author: frack113
|
||||
date: 2021/08/03
|
||||
description: Adversaries may employ various system checks to detect and avoid virtualization
|
||||
and analysis environments. This may include changing behaviors based on the results
|
||||
of checks for the presence of artifacts indicative of a virtual machine environment
|
||||
(VME) or sandbox
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*Get-WmiObject*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*MSAcpi_ThermalZoneTemperature*'
|
||||
SELECTION_3:
|
||||
ScriptBlockText: '*Win32_ComputerSystem*'
|
||||
condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3))
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: d93129cd-1ee0-479f-bc03-ca6f129882e3
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: EnableScriptBlockLogging must be set to enable
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1497.001/T1497.001.md
|
||||
- https://techgenix.com/malicious-powershell-scripts-evade-detection/
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1497.001
|
||||
yml_filename: powershell_detect_vm_env.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
27
rules/Sigma/powershell_dnscat_execution.yml
Normal file
27
rules/Sigma/powershell_dnscat_execution.yml
Normal file
@@ -0,0 +1,27 @@
|
||||
title: Dnscat Execution
|
||||
author: Daniil Yugoslavskiy, oscd.community
|
||||
date: 2019/10/24
|
||||
description: Dnscat exfiltration tool execution
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*Start-Dnscat2*'
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- "Legitimate usage of PowerShell Dnscat2 \u2014 DNS Exfiltration tool (unlikely)"
|
||||
id: a6d67db4-6220-436d-8afc-f3842fe05d43
|
||||
level: critical
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.exfiltration
|
||||
- attack.t1048
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
yml_filename: powershell_dnscat_execution.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
32
rules/Sigma/powershell_downgrade_attack.yml
Normal file
32
rules/Sigma/powershell_downgrade_attack.yml
Normal file
@@ -0,0 +1,32 @@
|
||||
title: PowerShell Downgrade Attack
|
||||
author: Florian Roth (rule), Lee Holmes (idea), Harish Segar (improvements)
|
||||
date: 2017/03/22
|
||||
description: Detects PowerShell downgrade attack by comparing the host versions with
|
||||
the actually used engine version 2.0
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EngineVersion: 2.*
|
||||
SELECTION_2:
|
||||
HostVersion: 2.*
|
||||
condition: (SELECTION_1 and not (SELECTION_2))
|
||||
falsepositives:
|
||||
- Penetration Test
|
||||
- Unknown
|
||||
id: 6331d09b-4785-4c13-980f-f96661356249
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_classic_start
|
||||
definition: fields have to be extract from event
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- http://www.leeholmes.com/blog/2017/03/17/detecting-and-preventing-powershell-downgrade-attacks/
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
yml_filename: powershell_downgrade_attack.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_classic
|
||||
|
||||
36
rules/Sigma/powershell_exe_calling_ps.yml
Normal file
36
rules/Sigma/powershell_exe_calling_ps.yml
Normal file
@@ -0,0 +1,36 @@
|
||||
title: PowerShell Called from an Executable Version Mismatch
|
||||
author: Sean Metcalf (source), Florian Roth (rule)
|
||||
date: 2017/03/05
|
||||
description: Detects PowerShell called from an executable by the version mismatch
|
||||
method
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EngineVersion: 2.*
|
||||
SELECTION_2:
|
||||
EngineVersion: 4.*
|
||||
SELECTION_3:
|
||||
EngineVersion: 5.*
|
||||
SELECTION_4:
|
||||
HostVersion: 3.*
|
||||
condition: ((SELECTION_1 or SELECTION_2 or SELECTION_3) and SELECTION_4)
|
||||
falsepositives:
|
||||
- Penetration Tests
|
||||
- Unknown
|
||||
id: c70e019b-1479-4b65-b0cc-cd0c6093a599
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_classic_start
|
||||
definition: fields have to be extract from event
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://adsecurity.org/?p=2921
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
yml_filename: powershell_exe_calling_ps.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_classic
|
||||
|
||||
31
rules/Sigma/powershell_get_clipboard.yml
Normal file
31
rules/Sigma/powershell_get_clipboard.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: PowerShell Get Clipboard
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
date: 2020/05/02
|
||||
description: A General detection for the Get-Clipboard commands in PowerShell logs.
|
||||
This could be an adversary capturing clipboard contents.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Payload: '*Get-Clipboard*'
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- unknown
|
||||
id: 4cbd4f12-2e22-43e3-882f-bff3247ffb78
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/OTRF/detection-hackathon-apt29/issues/16
|
||||
- https://threathunterplaybook.com/evals/apt29/detections/7.A.2_F4609F7E-C4DB-4327-91D4-59A58C962A02.html
|
||||
related:
|
||||
- id: 5486f63a-aa4c-488d-9a61-c9192853099f
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.collection
|
||||
- attack.t1115
|
||||
yml_filename: powershell_get_clipboard.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
32
rules/Sigma/powershell_icmp_exfiltration.yml
Normal file
32
rules/Sigma/powershell_icmp_exfiltration.yml
Normal file
@@ -0,0 +1,32 @@
|
||||
title: PowerShell ICMP Exfiltration
|
||||
author: Bartlomiej Czyz @bczyz1, oscd.community
|
||||
date: 2020/10/10
|
||||
description: Detects Exfiltration Over Alternative Protocol - ICMP. Adversaries may
|
||||
steal data by exfiltrating it over an un-encrypted network protocol other than
|
||||
that of the existing command and control channel.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*New-Object*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*System.Net.NetworkInformation.Ping*'
|
||||
SELECTION_3:
|
||||
ScriptBlockText: '*.Send(*'
|
||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
|
||||
falsepositives:
|
||||
- Legitimate usage of System.Net.NetworkInformation.Ping class
|
||||
id: 4c4af3cd-2115-479c-8193-6b8bfce9001c
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1048.003/T1048.003.md#atomic-test-2---exfiltration-over-alternative-protocol---icmp
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.exfiltration
|
||||
- attack.t1048.003
|
||||
yml_filename: powershell_icmp_exfiltration.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
25
rules/Sigma/powershell_invoke_nightmare.yml
Normal file
25
rules/Sigma/powershell_invoke_nightmare.yml
Normal file
@@ -0,0 +1,25 @@
|
||||
title: PrintNightmare Powershell Exploitation
|
||||
author: Max Altgelt, Tobias Michalski
|
||||
date: 2021/08/09
|
||||
description: Detects Commandlet name for PrintNightmare exploitation.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*Invoke-Nightmare*'
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 6d3f1399-a81c-4409-aff3-1ecfe9330baf
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script Block Logging must be enable
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/calebstewart/CVE-2021-1675
|
||||
status: test
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
yml_filename: powershell_invoke_nightmare.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
31
rules/Sigma/powershell_invoke_obfuscation_clip.yml
Normal file
31
rules/Sigma/powershell_invoke_obfuscation_clip.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Invoke-Obfuscation CLIP+ Launcher
|
||||
author: Jonathan Cheong, oscd.community
|
||||
date: 2020/10/13
|
||||
description: Detects Obfuscated use of Clip.exe to execute PowerShell
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Payload|re: .*cmd.{0,5}(?:\/c|\/r).+clip(?:\.exe)?.{0,4}&&.+clipboard]::\(\s\\\"\{\d\}.+\-f.+\"
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: a136cde0-61ad-4a61-9b82-8dc490e60dd2
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
related:
|
||||
- id: 73e67340-0d25-11eb-adc1-0242ac120002
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_clip.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
@@ -0,0 +1,28 @@
|
||||
title: Invoke-Obfuscation CLIP+ Launcher
|
||||
author: Jonathan Cheong, oscd.community
|
||||
date: 2020/10/13
|
||||
description: Detects Obfuscated use of Clip.exe to execute PowerShell
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText|re: .*cmd.{0,5}(?:\/c|\/r).+clip(?:\.exe)?.{0,4}&&.+clipboard]::\(\s\\\"\{\d\}.+\-f.+\"
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 73e67340-0d25-11eb-adc1-0242ac120002
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_clip_in_scriptblocktext.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
45
rules/Sigma/powershell_invoke_obfuscation_obfuscated_iex.yml
Normal file
45
rules/Sigma/powershell_invoke_obfuscation_obfuscated_iex.yml
Normal file
@@ -0,0 +1,45 @@
|
||||
title: Invoke-Obfuscation Obfuscated IEX Invocation
|
||||
author: Daniel Bohannon (@Mandiant/@FireEye), oscd.community
|
||||
date: 2019/11/08
|
||||
description: "Detects all variations of obfuscated powershell IEX invocation code\
|
||||
\ generated by Invoke-Obfuscation framework from the following code block \u2014\
|
||||
\ https://github.com/danielbohannon/Invoke-Obfuscation/blob/master/Out-ObfuscatedStringCommand.ps1#L873-L888"
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Payload|re: \$PSHome\[\s*\d{1,3}\s*\]\s*\+\s*\$PSHome\[
|
||||
SELECTION_2:
|
||||
Payload|re: \$ShellId\[\s*\d{1,3}\s*\]\s*\+\s*\$ShellId\[
|
||||
SELECTION_3:
|
||||
Payload|re: \$env:Public\[\s*\d{1,3}\s*\]\s*\+\s*\$env:Public\[
|
||||
SELECTION_4:
|
||||
Payload|re: \$env:ComSpec\[(\s*\d{1,3}\s*,){2}
|
||||
SELECTION_5:
|
||||
Payload|re: \\\\*mdr\\\\*\W\s*\)\.Name
|
||||
SELECTION_6:
|
||||
Payload|re: \$VerbosePreference\.ToString\(
|
||||
SELECTION_7:
|
||||
Payload|re: \String\]\s*\$VerbosePreference
|
||||
condition: (SELECTION_1 or SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7)
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 2f211361-7dce-442d-b78a-c04039677378
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
related:
|
||||
- id: 1b9dc62e-6e9e-42a3-8990-94d7a10007f7
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
yml_filename: powershell_invoke_obfuscation_obfuscated_iex.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
@@ -0,0 +1,42 @@
|
||||
title: Invoke-Obfuscation Obfuscated IEX Invocation
|
||||
author: Daniel Bohannon (@Mandiant/@FireEye), oscd.community
|
||||
date: 2019/11/08
|
||||
description: "Detects all variations of obfuscated powershell IEX invocation code\
|
||||
\ generated by Invoke-Obfuscation framework from the following code block \u2014\
|
||||
\ https://github.com/danielbohannon/Invoke-Obfuscation/blob/master/Out-ObfuscatedStringCommand.ps1#L873-L888"
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText|re: \$PSHome\[\s*\d{1,3}\s*\]\s*\+\s*\$PSHome\[
|
||||
SELECTION_2:
|
||||
ScriptBlockText|re: \$ShellId\[\s*\d{1,3}\s*\]\s*\+\s*\$ShellId\[
|
||||
SELECTION_3:
|
||||
ScriptBlockText|re: \$env:Public\[\s*\d{1,3}\s*\]\s*\+\s*\$env:Public\[
|
||||
SELECTION_4:
|
||||
ScriptBlockText|re: \$env:ComSpec\[(\s*\d{1,3}\s*,){2}
|
||||
SELECTION_5:
|
||||
ScriptBlockText|re: \\\\*mdr\\\\*\W\s*\)\.Name
|
||||
SELECTION_6:
|
||||
ScriptBlockText|re: \$VerbosePreference\.ToString\(
|
||||
SELECTION_7:
|
||||
ScriptBlockText|re: \String\]\s*\$VerbosePreference
|
||||
condition: (SELECTION_1 or SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7)
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 1b9dc62e-6e9e-42a3-8990-94d7a10007f7
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
yml_filename: powershell_invoke_obfuscation_obfuscated_iex_in_scriptblocktext.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
31
rules/Sigma/powershell_invoke_obfuscation_stdin.yml
Normal file
31
rules/Sigma/powershell_invoke_obfuscation_stdin.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Invoke-Obfuscation STDIN+ Launcher
|
||||
author: Jonathan Cheong, oscd.community
|
||||
date: 2020/10/15
|
||||
description: Detects Obfuscated use of stdin to execute PowerShell
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Payload|re: .*cmd.{0,5}(?:\/c|\/r).+powershell.+(?:\$\{?input\}?|noexit).+\"
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 9ac8b09b-45de-4a07-9da1-0de8c09304a3
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
related:
|
||||
- id: 779c8c12-0eb1-11eb-adc1-0242ac120002
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_stdin.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
@@ -0,0 +1,28 @@
|
||||
title: Invoke-Obfuscation STDIN+ Launcher
|
||||
author: Jonathan Cheong, oscd.community
|
||||
date: 2020/10/15
|
||||
description: Detects Obfuscated use of stdin to execute PowerShell
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText|re: .*cmd.{0,5}(?:\/c|\/r).+powershell.+(?:\$\{?input\}?|noexit).+\"
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 779c8c12-0eb1-11eb-adc1-0242ac120002
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_stdin_in_scriptblocktext.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
31
rules/Sigma/powershell_invoke_obfuscation_var.yml
Normal file
31
rules/Sigma/powershell_invoke_obfuscation_var.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Invoke-Obfuscation VAR+ Launcher
|
||||
author: Jonathan Cheong, oscd.community
|
||||
date: 2020/10/15
|
||||
description: Detects Obfuscated use of Environment Variables to execute PowerShell
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Payload|re: .*cmd.{0,5}(?:\/c|\/r)(?:\s|)\"set\s[a-zA-Z]{3,6}.*(?:\{\d\}){1,}\\\"\s+?\-f(?:.*\)){1,}.*\"
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 6bfb8fa7-b2e7-4f6c-8d9d-824e5d06ea9e
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
related:
|
||||
- id: 0adfbc14-0ed1-11eb-adc1-0242ac120002
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_var.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
@@ -0,0 +1,28 @@
|
||||
title: Invoke-Obfuscation VAR+ Launcher
|
||||
author: Jonathan Cheong, oscd.community
|
||||
date: 2020/10/15
|
||||
description: Detects Obfuscated use of Environment Variables to execute PowerShell
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText|re: .*cmd.{0,5}(?:\/c|\/r)(?:\s|)\"set\s[a-zA-Z]{3,6}.*(?:\{\d\}){1,}\\\"\s+?\-f(?:.*\)){1,}.*\"
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 0adfbc14-0ed1-11eb-adc1-0242ac120002
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_var_in_scriptblocktext.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
31
rules/Sigma/powershell_invoke_obfuscation_via_compress.yml
Normal file
31
rules/Sigma/powershell_invoke_obfuscation_via_compress.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Invoke-Obfuscation COMPRESS OBFUSCATION
|
||||
author: Timur Zinniatullin, oscd.community
|
||||
date: 2020/10/18
|
||||
description: Detects Obfuscated Powershell via COMPRESS OBFUSCATION
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Payload|re: (?i).*new-object.*(?:system\.io\.compression\.deflatestream|system\.io\.streamreader).*text\.encoding\]::ascii.*readtoend
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- unknown
|
||||
id: 7034cbbb-cc55-4dc2-8dad-36c0b942e8f1
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
related:
|
||||
- id: 20e5497e-331c-4cd5-8d36-935f6e2a9a07
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_via_compress.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
@@ -0,0 +1,28 @@
|
||||
title: Invoke-Obfuscation COMPRESS OBFUSCATION
|
||||
author: Timur Zinniatullin, oscd.community
|
||||
date: 2020/10/18
|
||||
description: Detects Obfuscated Powershell via COMPRESS OBFUSCATION
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText|re: (?i).*new-object.*(?:system\.io\.compression\.deflatestream|system\.io\.streamreader).*text\.encoding\]::ascii.*readtoend
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- unknown
|
||||
id: 20e5497e-331c-4cd5-8d36-935f6e2a9a07
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_via_compress_in_scriptblocktext.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
31
rules/Sigma/powershell_invoke_obfuscation_via_rundll.yml
Normal file
31
rules/Sigma/powershell_invoke_obfuscation_via_rundll.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Invoke-Obfuscation RUNDLL LAUNCHER
|
||||
author: Timur Zinniatullin, oscd.community
|
||||
date: 2020/10/18
|
||||
description: Detects Obfuscated Powershell via RUNDLL LAUNCHER
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Payload|re: (?i).*rundll32(?:\.exe)?(?:\s+)?shell32\.dll.*shellexec_rundll.*powershell.*\"
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: a23791fe-8846-485a-b16b-ca691e1b03d4
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
related:
|
||||
- id: e6cb92b4-b470-4eb8-8a9d-d63e8583aae0
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_via_rundll.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
@@ -0,0 +1,28 @@
|
||||
title: Invoke-Obfuscation RUNDLL LAUNCHER
|
||||
author: Timur Zinniatullin, oscd.community
|
||||
date: 2020/10/18
|
||||
description: Detects Obfuscated Powershell via RUNDLL LAUNCHER
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText|re: (?i).*rundll32(?:\.exe)?(?:\s+)?shell32\.dll.*shellexec_rundll.*powershell.*\"
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: e6cb92b4-b470-4eb8-8a9d-d63e8583aae0
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_via_rundll_in_scriptblocktext.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
31
rules/Sigma/powershell_invoke_obfuscation_via_stdin.yml
Normal file
31
rules/Sigma/powershell_invoke_obfuscation_via_stdin.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Invoke-Obfuscation Via Stdin
|
||||
author: Nikita Nazarov, oscd.community
|
||||
date: 2020/10/12
|
||||
description: Detects Obfuscated Powershell via Stdin in Scripts
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Payload|re: (?i).*(set).*&&\s?set.*(environment|invoke|\${?input).*&&.*"
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: c72aca44-8d52-45ad-8f81-f96c4d3c755e
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
related:
|
||||
- id: 86b896ba-ffa1-4fea-83e3-ee28a4c915c7
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_via_stdin.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
@@ -0,0 +1,28 @@
|
||||
title: Invoke-Obfuscation Via Stdin
|
||||
author: Nikita Nazarov, oscd.community
|
||||
date: 2020/10/12
|
||||
description: Detects Obfuscated Powershell via Stdin in Scripts
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText|re: (?i).*(set).*&&\s?set.*(environment|invoke|\${?input).*&&.*"
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 86b896ba-ffa1-4fea-83e3-ee28a4c915c7
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_via_stdin_in_scriptblocktext.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
31
rules/Sigma/powershell_invoke_obfuscation_via_use_clip.yml
Normal file
31
rules/Sigma/powershell_invoke_obfuscation_via_use_clip.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Invoke-Obfuscation Via Use Clip
|
||||
author: Nikita Nazarov, oscd.community
|
||||
date: 2020/10/09
|
||||
description: Detects Obfuscated Powershell via use Clip.exe in Scripts
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Payload|re: (?i).*?echo.*clip.*&&.*(Clipboard|i`?n`?v`?o`?k`?e`?).*
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: ebdf49d8-b89c-46c9-8fdf-2c308406f6bd
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
related:
|
||||
- id: db92dd33-a3ad-49cf-8c2c-608c3e30ace0
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_via_use_clip.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
@@ -0,0 +1,28 @@
|
||||
title: Invoke-Obfuscation Via Use Clip
|
||||
author: Nikita Nazarov, oscd.community
|
||||
date: 2020/10/09
|
||||
description: Detects Obfuscated Powershell via use Clip.exe in Scripts
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText|re: (?i).*?echo.*clip.*&&.*(Clipboard|i`?n`?v`?o`?k`?e`?).*
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: db92dd33-a3ad-49cf-8c2c-608c3e30ace0
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_via_use_clip_in_scriptblocktext.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
31
rules/Sigma/powershell_invoke_obfuscation_via_use_mhsta.yml
Normal file
31
rules/Sigma/powershell_invoke_obfuscation_via_use_mhsta.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Invoke-Obfuscation Via Use MSHTA
|
||||
author: Nikita Nazarov, oscd.community
|
||||
date: 2020/10/08
|
||||
description: Detects Obfuscated Powershell via use MSHTA in Scripts
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Payload|re: (?i).*(set).*(&&).*(mshta).*(vbscript:createobject).*(\.run).*\(window\.close\).*"
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 07ad2ea8-6a55-4ac6-bf3e-91b8e59676eb
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabledd
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
related:
|
||||
- id: e55a5195-4724-480e-a77e-3ebe64bd3759
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_via_use_mhsta.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
@@ -0,0 +1,28 @@
|
||||
title: Invoke-Obfuscation Via Use MSHTA
|
||||
author: Nikita Nazarov, oscd.community
|
||||
date: 2020/10/08
|
||||
description: Detects Obfuscated Powershell via use MSHTA in Scripts
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText|re: (?i).*(set).*(&&).*(mshta).*(vbscript:createobject).*(\.run).*\(window\.close\).*"
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: e55a5195-4724-480e-a77e-3ebe64bd3759
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_via_use_mhsta_in_scriptblocktext.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
@@ -0,0 +1,31 @@
|
||||
title: Invoke-Obfuscation Via Use Rundll32
|
||||
author: Nikita Nazarov, oscd.community
|
||||
date: 2019/10/08
|
||||
description: Detects Obfuscated Powershell via use Rundll32 in Scripts
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Payload|re: (?i).*&&.*rundll32.*shell32\.dll.*shellexec_rundll.*(value|invoke|comspec|iex).*"
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 88a22f69-62f9-4b8a-aa00-6b0212f2f05a
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
related:
|
||||
- id: a5a30a6e-75ca-4233-8b8c-42e0f2037d3b
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_via_use_rundll32.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
@@ -0,0 +1,28 @@
|
||||
title: Invoke-Obfuscation Via Use Rundll32
|
||||
author: Nikita Nazarov, oscd.community
|
||||
date: 2019/10/08
|
||||
description: Detects Obfuscated Powershell via use Rundll32 in Scripts
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText|re: (?i).*&&.*rundll32.*shell32\.dll.*shellexec_rundll.*(value|invoke|comspec|iex).*"
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: a5a30a6e-75ca-4233-8b8c-42e0f2037d3b
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_via_use_rundll32_in_scriptblocktext.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
31
rules/Sigma/powershell_invoke_obfuscation_via_var.yml
Normal file
31
rules/Sigma/powershell_invoke_obfuscation_via_var.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION
|
||||
author: Timur Zinniatullin, oscd.community
|
||||
date: 2020/10/13
|
||||
description: Detects Obfuscated Powershell via VAR++ LAUNCHER
|
||||
detection:
|
||||
SELECTION_1:
|
||||
Payload|re: (?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: f3c89218-8c3d-4ba9-9974-f1d8e6a1b4a6
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabledd
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
related:
|
||||
- id: e54f5149-6ba3-49cf-b153-070d24679126
|
||||
type: derived
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_via_var.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
@@ -0,0 +1,28 @@
|
||||
title: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION
|
||||
author: Timur Zinniatullin, oscd.community
|
||||
date: 2020/10/13
|
||||
description: Detects Obfuscated Powershell via VAR++ LAUNCHER
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText|re: (?i).*&&set.*(\{\d\}){2,}\\\"\s+?\-f.*&&.*cmd.*\/c
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: e54f5149-6ba3-49cf-b153-070d24679126
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/issues/1009
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_invoke_obfuscation_via_var_in_scriptblocktext.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
32
rules/Sigma/powershell_keylogging.yml
Normal file
32
rules/Sigma/powershell_keylogging.yml
Normal file
@@ -0,0 +1,32 @@
|
||||
title: Powershell Keylogging
|
||||
author: frack113
|
||||
date: 2021/07/30
|
||||
description: Adversaries may log user keystrokes to intercept credentials as the user
|
||||
types them.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*Get-Keystrokes*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*Get-ProcAddress user32.dll GetAsyncKeyState*'
|
||||
SELECTION_3:
|
||||
ScriptBlockText: '*Get-ProcAddress user32.dll GetForegroundWindow*'
|
||||
condition: (SELECTION_1 or (SELECTION_2 and SELECTION_3))
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: 34f90d3c-c297-49e9-b26d-911b05a4866c
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: EnableScriptBlockLogging must be set to enable
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1218/T1218.md
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1056.001/src/Get-Keystrokes.ps1
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.collection
|
||||
- attack.t1056.001
|
||||
yml_filename: powershell_keylogging.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
237
rules/Sigma/powershell_malicious_commandlets.yml
Normal file
237
rules/Sigma/powershell_malicious_commandlets.yml
Normal file
@@ -0,0 +1,237 @@
|
||||
title: Malicious PowerShell Commandlets
|
||||
author: Sean Metcalf (source), Florian Roth (rule), Bartlomiej Czyz @bczyz1 (update),
|
||||
oscd.community (update)
|
||||
date: 2017/03/05
|
||||
description: Detects Commandlet names from well-known PowerShell exploitation frameworks
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*Invoke-DllInjection*'
|
||||
SELECTION_10:
|
||||
ScriptBlockText: '*Invoke-NinjaCopy*'
|
||||
SELECTION_11:
|
||||
ScriptBlockText: '*Invoke-TokenManipulation*'
|
||||
SELECTION_12:
|
||||
ScriptBlockText: '*Out-Minidump*'
|
||||
SELECTION_13:
|
||||
ScriptBlockText: '*VolumeShadowCopyTools*'
|
||||
SELECTION_14:
|
||||
ScriptBlockText: '*Invoke-ReflectivePEInjection*'
|
||||
SELECTION_15:
|
||||
ScriptBlockText: '*Invoke-UserHunter*'
|
||||
SELECTION_16:
|
||||
ScriptBlockText: '*Find-GPOLocation*'
|
||||
SELECTION_17:
|
||||
ScriptBlockText: '*Invoke-ACLScanner*'
|
||||
SELECTION_18:
|
||||
ScriptBlockText: '*Invoke-DowngradeAccount*'
|
||||
SELECTION_19:
|
||||
ScriptBlockText: '*Get-ServiceUnquoted*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*Invoke-Shellcode*'
|
||||
SELECTION_20:
|
||||
ScriptBlockText: '*Get-ServiceFilePermission*'
|
||||
SELECTION_21:
|
||||
ScriptBlockText: '*Get-ServicePermission*'
|
||||
SELECTION_22:
|
||||
ScriptBlockText: '*Invoke-ServiceAbuse*'
|
||||
SELECTION_23:
|
||||
ScriptBlockText: '*Install-ServiceBinary*'
|
||||
SELECTION_24:
|
||||
ScriptBlockText: '*Get-RegAutoLogon*'
|
||||
SELECTION_25:
|
||||
ScriptBlockText: '*Get-VulnAutoRun*'
|
||||
SELECTION_26:
|
||||
ScriptBlockText: '*Get-VulnSchTask*'
|
||||
SELECTION_27:
|
||||
ScriptBlockText: '*Get-UnattendedInstallFile*'
|
||||
SELECTION_28:
|
||||
ScriptBlockText: '*Get-ApplicationHost*'
|
||||
SELECTION_29:
|
||||
ScriptBlockText: '*Get-RegAlwaysInstallElevated*'
|
||||
SELECTION_3:
|
||||
ScriptBlockText: '*Invoke-WmiCommand*'
|
||||
SELECTION_30:
|
||||
ScriptBlockText: '*Get-Unconstrained*'
|
||||
SELECTION_31:
|
||||
ScriptBlockText: '*Add-RegBackdoor*'
|
||||
SELECTION_32:
|
||||
ScriptBlockText: '*Add-ScrnSaveBackdoor*'
|
||||
SELECTION_33:
|
||||
ScriptBlockText: '*Gupt-Backdoor*'
|
||||
SELECTION_34:
|
||||
ScriptBlockText: '*Invoke-ADSBackdoor*'
|
||||
SELECTION_35:
|
||||
ScriptBlockText: '*Enabled-DuplicateToken*'
|
||||
SELECTION_36:
|
||||
ScriptBlockText: '*Invoke-PsUaCme*'
|
||||
SELECTION_37:
|
||||
ScriptBlockText: '*Remove-Update*'
|
||||
SELECTION_38:
|
||||
ScriptBlockText: '*Check-VM*'
|
||||
SELECTION_39:
|
||||
ScriptBlockText: '*Get-LSASecret*'
|
||||
SELECTION_4:
|
||||
ScriptBlockText: '*Get-GPPPassword*'
|
||||
SELECTION_40:
|
||||
ScriptBlockText: '*Get-PassHashes*'
|
||||
SELECTION_41:
|
||||
ScriptBlockText: '*Show-TargetScreen*'
|
||||
SELECTION_42:
|
||||
ScriptBlockText: '*Port-Scan*'
|
||||
SELECTION_43:
|
||||
ScriptBlockText: '*Invoke-PoshRatHttp*'
|
||||
SELECTION_44:
|
||||
ScriptBlockText: '*Invoke-PowerShellTCP*'
|
||||
SELECTION_45:
|
||||
ScriptBlockText: '*Invoke-PowerShellWMI*'
|
||||
SELECTION_46:
|
||||
ScriptBlockText: '*Add-Exfiltration*'
|
||||
SELECTION_47:
|
||||
ScriptBlockText: '*Add-Persistence*'
|
||||
SELECTION_48:
|
||||
ScriptBlockText: '*Do-Exfiltration*'
|
||||
SELECTION_49:
|
||||
ScriptBlockText: '*Start-CaptureServer*'
|
||||
SELECTION_5:
|
||||
ScriptBlockText: '*Get-Keystrokes*'
|
||||
SELECTION_50:
|
||||
ScriptBlockText: '*Get-ChromeDump*'
|
||||
SELECTION_51:
|
||||
ScriptBlockText: '*Get-ClipboardContents*'
|
||||
SELECTION_52:
|
||||
ScriptBlockText: '*Get-FoxDump*'
|
||||
SELECTION_53:
|
||||
ScriptBlockText: '*Get-IndexedItem*'
|
||||
SELECTION_54:
|
||||
ScriptBlockText: '*Get-Screenshot*'
|
||||
SELECTION_55:
|
||||
ScriptBlockText: '*Invoke-Inveigh*'
|
||||
SELECTION_56:
|
||||
ScriptBlockText: '*Invoke-NetRipper*'
|
||||
SELECTION_57:
|
||||
ScriptBlockText: '*Invoke-EgressCheck*'
|
||||
SELECTION_58:
|
||||
ScriptBlockText: '*Invoke-PostExfil*'
|
||||
SELECTION_59:
|
||||
ScriptBlockText: '*Invoke-PSInject*'
|
||||
SELECTION_6:
|
||||
ScriptBlockText: '*Get-TimedScreenshot*'
|
||||
SELECTION_60:
|
||||
ScriptBlockText: '*Invoke-RunAs*'
|
||||
SELECTION_61:
|
||||
ScriptBlockText: '*MailRaider*'
|
||||
SELECTION_62:
|
||||
ScriptBlockText: '*New-HoneyHash*'
|
||||
SELECTION_63:
|
||||
ScriptBlockText: '*Set-MacAttribute*'
|
||||
SELECTION_64:
|
||||
ScriptBlockText: '*Invoke-DCSync*'
|
||||
SELECTION_65:
|
||||
ScriptBlockText: '*Invoke-PowerDump*'
|
||||
SELECTION_66:
|
||||
ScriptBlockText: '*Exploit-Jboss*'
|
||||
SELECTION_67:
|
||||
ScriptBlockText: '*Invoke-ThunderStruck*'
|
||||
SELECTION_68:
|
||||
ScriptBlockText: '*Invoke-VoiceTroll*'
|
||||
SELECTION_69:
|
||||
ScriptBlockText: '*Set-Wallpaper*'
|
||||
SELECTION_7:
|
||||
ScriptBlockText: '*Get-VaultCredential*'
|
||||
SELECTION_70:
|
||||
ScriptBlockText: '*Invoke-InveighRelay*'
|
||||
SELECTION_71:
|
||||
ScriptBlockText: '*Invoke-PsExec*'
|
||||
SELECTION_72:
|
||||
ScriptBlockText: '*Invoke-SSHCommand*'
|
||||
SELECTION_73:
|
||||
ScriptBlockText: '*Get-SecurityPackages*'
|
||||
SELECTION_74:
|
||||
ScriptBlockText: '*Install-SSP*'
|
||||
SELECTION_75:
|
||||
ScriptBlockText: '*Invoke-BackdoorLNK*'
|
||||
SELECTION_76:
|
||||
ScriptBlockText: '*PowerBreach*'
|
||||
SELECTION_77:
|
||||
ScriptBlockText: '*Get-SiteListPassword*'
|
||||
SELECTION_78:
|
||||
ScriptBlockText: '*Get-System*'
|
||||
SELECTION_79:
|
||||
ScriptBlockText: '*Invoke-BypassUAC*'
|
||||
SELECTION_8:
|
||||
ScriptBlockText: '*Invoke-CredentialInjection*'
|
||||
SELECTION_80:
|
||||
ScriptBlockText: '*Invoke-Tater*'
|
||||
SELECTION_81:
|
||||
ScriptBlockText: '*Invoke-WScriptBypassUAC*'
|
||||
SELECTION_82:
|
||||
ScriptBlockText: '*PowerUp*'
|
||||
SELECTION_83:
|
||||
ScriptBlockText: '*PowerView*'
|
||||
SELECTION_84:
|
||||
ScriptBlockText: '*Get-RickAstley*'
|
||||
SELECTION_85:
|
||||
ScriptBlockText: '*Find-Fruit*'
|
||||
SELECTION_86:
|
||||
ScriptBlockText: '*HTTP-Login*'
|
||||
SELECTION_87:
|
||||
ScriptBlockText: '*Find-TrustedDocuments*'
|
||||
SELECTION_88:
|
||||
ScriptBlockText: '*Invoke-Paranoia*'
|
||||
SELECTION_89:
|
||||
ScriptBlockText: '*Invoke-WinEnum*'
|
||||
SELECTION_9:
|
||||
ScriptBlockText: '*Invoke-Mimikatz*'
|
||||
SELECTION_90:
|
||||
ScriptBlockText: '*Invoke-ARPScan*'
|
||||
SELECTION_91:
|
||||
ScriptBlockText: '*Invoke-PortScan*'
|
||||
SELECTION_92:
|
||||
ScriptBlockText: '*Invoke-ReverseDNSLookup*'
|
||||
SELECTION_93:
|
||||
ScriptBlockText: '*Invoke-SMBScanner*'
|
||||
SELECTION_94:
|
||||
ScriptBlockText: '*Invoke-Mimikittenz*'
|
||||
SELECTION_95:
|
||||
ScriptBlockText: '*Invoke-AllChecks*'
|
||||
SELECTION_96:
|
||||
ScriptBlockText: '*Get-SystemDriveInfo*'
|
||||
condition: ((SELECTION_1 or SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10
|
||||
or SELECTION_11 or SELECTION_12 or SELECTION_13 or SELECTION_14 or SELECTION_15
|
||||
or SELECTION_16 or SELECTION_17 or SELECTION_18 or SELECTION_19 or SELECTION_20
|
||||
or SELECTION_21 or SELECTION_22 or SELECTION_23 or SELECTION_24 or SELECTION_25
|
||||
or SELECTION_26 or SELECTION_27 or SELECTION_28 or SELECTION_29 or SELECTION_30
|
||||
or SELECTION_31 or SELECTION_32 or SELECTION_33 or SELECTION_34 or SELECTION_35
|
||||
or SELECTION_36 or SELECTION_37 or SELECTION_38 or SELECTION_39 or SELECTION_40
|
||||
or SELECTION_41 or SELECTION_42 or SELECTION_43 or SELECTION_44 or SELECTION_45
|
||||
or SELECTION_46 or SELECTION_47 or SELECTION_48 or SELECTION_49 or SELECTION_50
|
||||
or SELECTION_51 or SELECTION_52 or SELECTION_53 or SELECTION_54 or SELECTION_55
|
||||
or SELECTION_56 or SELECTION_57 or SELECTION_58 or SELECTION_59 or SELECTION_60
|
||||
or SELECTION_61 or SELECTION_62 or SELECTION_63 or SELECTION_64 or SELECTION_65
|
||||
or SELECTION_66 or SELECTION_67 or SELECTION_68 or SELECTION_69 or SELECTION_70
|
||||
or SELECTION_71 or SELECTION_72 or SELECTION_73 or SELECTION_74 or SELECTION_75
|
||||
or SELECTION_76 or SELECTION_77 or SELECTION_78 or SELECTION_79 or SELECTION_80
|
||||
or SELECTION_81 or SELECTION_82 or SELECTION_83 or SELECTION_84 or SELECTION_85
|
||||
or SELECTION_86 or SELECTION_87 or SELECTION_88 or SELECTION_89 or SELECTION_90
|
||||
or SELECTION_91 or SELECTION_92 or SELECTION_93 or SELECTION_94 or SELECTION_95)
|
||||
and not (SELECTION_96))
|
||||
falsepositives:
|
||||
- Penetration testing
|
||||
id: 89819aa4-bbd6-46bc-88ec-c7f7fe30efa6
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script Block Logging must be enable
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://adsecurity.org/?p=2921
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
yml_filename: powershell_malicious_commandlets.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
69
rules/Sigma/powershell_malicious_keywords.yml
Normal file
69
rules/Sigma/powershell_malicious_keywords.yml
Normal file
@@ -0,0 +1,69 @@
|
||||
title: Malicious PowerShell Keywords
|
||||
author: Sean Metcalf (source), Florian Roth (rule)
|
||||
date: 2017/03/05
|
||||
description: Detects keywords from well-known PowerShell exploitation frameworks
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*AdjustTokenPrivileges*'
|
||||
SELECTION_10:
|
||||
ScriptBlockText: '*TOKEN_ADJUST_PRIVILEGES*'
|
||||
SELECTION_11:
|
||||
ScriptBlockText: '*TOKEN_ALL_ACCESS*'
|
||||
SELECTION_12:
|
||||
ScriptBlockText: '*TOKEN_ASSIGN_PRIMARY*'
|
||||
SELECTION_13:
|
||||
ScriptBlockText: '*TOKEN_DUPLICATE*'
|
||||
SELECTION_14:
|
||||
ScriptBlockText: '*TOKEN_ELEVATION*'
|
||||
SELECTION_15:
|
||||
ScriptBlockText: '*TOKEN_IMPERSONATE*'
|
||||
SELECTION_16:
|
||||
ScriptBlockText: '*TOKEN_INFORMATION_CLASS*'
|
||||
SELECTION_17:
|
||||
ScriptBlockText: '*TOKEN_PRIVILEGES*'
|
||||
SELECTION_18:
|
||||
ScriptBlockText: '*TOKEN_QUERY*'
|
||||
SELECTION_19:
|
||||
ScriptBlockText: '*Metasploit*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*IMAGE_NT_OPTIONAL_HDR64_MAGIC*'
|
||||
SELECTION_20:
|
||||
ScriptBlockText: '*Mimikatz*'
|
||||
SELECTION_3:
|
||||
ScriptBlockText: '*Microsoft.Win32.UnsafeNativeMethods*'
|
||||
SELECTION_4:
|
||||
ScriptBlockText: '*ReadProcessMemory.Invoke*'
|
||||
SELECTION_5:
|
||||
ScriptBlockText: '*SE_PRIVILEGE_ENABLED*'
|
||||
SELECTION_6:
|
||||
ScriptBlockText: '*LSA_UNICODE_STRING*'
|
||||
SELECTION_7:
|
||||
ScriptBlockText: '*MiniDumpWriteDump*'
|
||||
SELECTION_8:
|
||||
ScriptBlockText: '*PAGE_EXECUTE_READ*'
|
||||
SELECTION_9:
|
||||
ScriptBlockText: '*SECURITY_DELEGATION*'
|
||||
condition: (SELECTION_1 or SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10
|
||||
or SELECTION_11 or SELECTION_12 or SELECTION_13 or SELECTION_14 or SELECTION_15
|
||||
or SELECTION_16 or SELECTION_17 or SELECTION_18 or SELECTION_19 or SELECTION_20)
|
||||
falsepositives:
|
||||
- Penetration tests
|
||||
id: f62176f3-8128-4faa-bf6c-83261322e5eb
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: It is recommended to use the new "Script Block Logging" of PowerShell
|
||||
v5 https://adsecurity.org/?p=2277
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://adsecurity.org/?p=2921
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
yml_filename: powershell_malicious_keywords.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
@@ -0,0 +1,28 @@
|
||||
title: Live Memory Dump Using Powershell
|
||||
author: Max Altgelt
|
||||
date: 2021/09/21
|
||||
description: Detects usage of a PowerShell command to dump the live memory of a Windows
|
||||
machine
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*Get-StorageDiagnosticInfo*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*-IncludeLiveDump*'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- Diagnostics
|
||||
id: cd185561-4760-45d6-a63e-a51325112cae
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://docs.microsoft.com/en-us/powershell/module/storage/get-storagediagnosticinfo
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.t1003
|
||||
yml_filename: powershell_memorydump_getstoragediagnosticinfo.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
179
rules/Sigma/powershell_nishang_malicious_commandlets.yml
Normal file
179
rules/Sigma/powershell_nishang_malicious_commandlets.yml
Normal file
@@ -0,0 +1,179 @@
|
||||
title: Malicious Nishang PowerShell Commandlets
|
||||
author: Alec Costello
|
||||
date: 2019/05/16
|
||||
description: Detects Commandlet names and arguments from the Nishang exploitation
|
||||
framework
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*Add-ConstrainedDelegationBackdoor*'
|
||||
SELECTION_10:
|
||||
ScriptBlockText: '*Out-HTA*'
|
||||
SELECTION_11:
|
||||
ScriptBlockText: '*Out-SCF*'
|
||||
SELECTION_12:
|
||||
ScriptBlockText: '*Out-SCT*'
|
||||
SELECTION_13:
|
||||
ScriptBlockText: '*Out-Shortcut*'
|
||||
SELECTION_14:
|
||||
ScriptBlockText: '*Out-WebQuery*'
|
||||
SELECTION_15:
|
||||
ScriptBlockText: '*Out-Word*'
|
||||
SELECTION_16:
|
||||
ScriptBlockText: '*Enable-Duplication*'
|
||||
SELECTION_17:
|
||||
ScriptBlockText: '*Remove-Update*'
|
||||
SELECTION_18:
|
||||
ScriptBlockText: '*Download-Execute-PS*'
|
||||
SELECTION_19:
|
||||
ScriptBlockText: '*Download_Execute*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*Set-DCShadowPermissions*'
|
||||
SELECTION_20:
|
||||
ScriptBlockText: '*Execute-Command-MSSQL*'
|
||||
SELECTION_21:
|
||||
ScriptBlockText: '*Execute-DNSTXT-Code*'
|
||||
SELECTION_22:
|
||||
ScriptBlockText: '*Out-RundllCommand*'
|
||||
SELECTION_23:
|
||||
ScriptBlockText: '*Copy-VSS*'
|
||||
SELECTION_24:
|
||||
ScriptBlockText: '*FireBuster*'
|
||||
SELECTION_25:
|
||||
ScriptBlockText: '*FireListener*'
|
||||
SELECTION_26:
|
||||
ScriptBlockText: '*Get-Information*'
|
||||
SELECTION_27:
|
||||
ScriptBlockText: '*Get-PassHints*'
|
||||
SELECTION_28:
|
||||
ScriptBlockText: '*Get-WLAN-Keys*'
|
||||
SELECTION_29:
|
||||
ScriptBlockText: '*Get-Web-Credentials*'
|
||||
SELECTION_3:
|
||||
ScriptBlockText: '*DNS_TXT_Pwnage*'
|
||||
SELECTION_30:
|
||||
ScriptBlockText: '*Invoke-CredentialsPhish*'
|
||||
SELECTION_31:
|
||||
ScriptBlockText: '*Invoke-MimikatzWDigestDowngrade*'
|
||||
SELECTION_32:
|
||||
ScriptBlockText: '*Invoke-SSIDExfil*'
|
||||
SELECTION_33:
|
||||
ScriptBlockText: '*Invoke-SessionGopher*'
|
||||
SELECTION_34:
|
||||
ScriptBlockText: '*Keylogger*'
|
||||
SELECTION_35:
|
||||
ScriptBlockText: '*Invoke-Interceptor*'
|
||||
SELECTION_36:
|
||||
ScriptBlockText: '*Create-MultipleSessions*'
|
||||
SELECTION_37:
|
||||
ScriptBlockText: '*Invoke-NetworkRelay*'
|
||||
SELECTION_38:
|
||||
ScriptBlockText: '*Run-EXEonRemote*'
|
||||
SELECTION_39:
|
||||
ScriptBlockText: '*Invoke-Prasadhak*'
|
||||
SELECTION_4:
|
||||
ScriptBlockText: '*Execute-OnTime*'
|
||||
SELECTION_40:
|
||||
ScriptBlockText: '*Invoke-BruteForce*'
|
||||
SELECTION_41:
|
||||
ScriptBlockText: '*Password-List*'
|
||||
SELECTION_42:
|
||||
ScriptBlockText: '*Invoke-JSRatRegsvr*'
|
||||
SELECTION_43:
|
||||
ScriptBlockText: '*Invoke-JSRatRundll*'
|
||||
SELECTION_44:
|
||||
ScriptBlockText: '*Invoke-PoshRatHttps*'
|
||||
SELECTION_45:
|
||||
ScriptBlockText: '*Invoke-PowerShellIcmp*'
|
||||
SELECTION_46:
|
||||
ScriptBlockText: '*Invoke-PowerShellUdp*'
|
||||
SELECTION_47:
|
||||
ScriptBlockText: '*Invoke-PSGcat*'
|
||||
SELECTION_48:
|
||||
ScriptBlockText: '*Invoke-PsGcatAgent*'
|
||||
SELECTION_49:
|
||||
ScriptBlockText: '*Remove-PoshRat*'
|
||||
SELECTION_5:
|
||||
ScriptBlockText: '*HTTP-Backdoor*'
|
||||
SELECTION_50:
|
||||
ScriptBlockText: '*Add-Persistance*'
|
||||
SELECTION_51:
|
||||
ScriptBlockText: '*ExetoText*'
|
||||
SELECTION_52:
|
||||
ScriptBlockText: '*Invoke-Decode*'
|
||||
SELECTION_53:
|
||||
ScriptBlockText: '*Invoke-Encode*'
|
||||
SELECTION_54:
|
||||
ScriptBlockText: '*Parse_Keys*'
|
||||
SELECTION_55:
|
||||
ScriptBlockText: '*Remove-Persistence*'
|
||||
SELECTION_56:
|
||||
ScriptBlockText: '*StringtoBase64*'
|
||||
SELECTION_57:
|
||||
ScriptBlockText: '*TexttoExe*'
|
||||
SELECTION_58:
|
||||
ScriptBlockText: '*Powerpreter*'
|
||||
SELECTION_59:
|
||||
ScriptBlockText: '*Nishang*'
|
||||
SELECTION_6:
|
||||
ScriptBlockText: '*Set-RemotePSRemoting*'
|
||||
SELECTION_60:
|
||||
ScriptBlockText: '*DataToEncode*'
|
||||
SELECTION_61:
|
||||
ScriptBlockText: '*LoggedKeys*'
|
||||
SELECTION_62:
|
||||
ScriptBlockText: '*OUT-DNSTXT*'
|
||||
SELECTION_63:
|
||||
ScriptBlockText: '*ExfilOption*'
|
||||
SELECTION_64:
|
||||
ScriptBlockText: '*DumpCerts*'
|
||||
SELECTION_65:
|
||||
ScriptBlockText: '*DumpCreds*'
|
||||
SELECTION_66:
|
||||
ScriptBlockText: '*Shellcode32*'
|
||||
SELECTION_67:
|
||||
ScriptBlockText: '*Shellcode64*'
|
||||
SELECTION_68:
|
||||
ScriptBlockText: '*NotAllNameSpaces*'
|
||||
SELECTION_69:
|
||||
ScriptBlockText: '*exfill*'
|
||||
SELECTION_7:
|
||||
ScriptBlockText: '*Set-RemoteWMI*'
|
||||
SELECTION_70:
|
||||
ScriptBlockText: '*FakeDC*'
|
||||
SELECTION_8:
|
||||
ScriptBlockText: '*Invoke-AmsiBypass*'
|
||||
SELECTION_9:
|
||||
ScriptBlockText: '*Out-CHM*'
|
||||
condition: (SELECTION_1 or SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10
|
||||
or SELECTION_11 or SELECTION_12 or SELECTION_13 or SELECTION_14 or SELECTION_15
|
||||
or SELECTION_16 or SELECTION_17 or SELECTION_18 or SELECTION_19 or SELECTION_20
|
||||
or SELECTION_21 or SELECTION_22 or SELECTION_23 or SELECTION_24 or SELECTION_25
|
||||
or SELECTION_26 or SELECTION_27 or SELECTION_28 or SELECTION_29 or SELECTION_30
|
||||
or SELECTION_31 or SELECTION_32 or SELECTION_33 or SELECTION_34 or SELECTION_35
|
||||
or SELECTION_36 or SELECTION_37 or SELECTION_38 or SELECTION_39 or SELECTION_40
|
||||
or SELECTION_41 or SELECTION_42 or SELECTION_43 or SELECTION_44 or SELECTION_45
|
||||
or SELECTION_46 or SELECTION_47 or SELECTION_48 or SELECTION_49 or SELECTION_50
|
||||
or SELECTION_51 or SELECTION_52 or SELECTION_53 or SELECTION_54 or SELECTION_55
|
||||
or SELECTION_56 or SELECTION_57 or SELECTION_58 or SELECTION_59 or SELECTION_60
|
||||
or SELECTION_61 or SELECTION_62 or SELECTION_63 or SELECTION_64 or SELECTION_65
|
||||
or SELECTION_66 or SELECTION_67 or SELECTION_68 or SELECTION_69 or SELECTION_70)
|
||||
falsepositives:
|
||||
- Penetration testing
|
||||
id: f772cee9-b7c2-4cb2-8f07-49870adc02e0
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://github.com/samratashok/nishang
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
yml_filename: powershell_nishang_malicious_commandlets.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
36
rules/Sigma/powershell_ntfs_ads_access.yml
Normal file
36
rules/Sigma/powershell_ntfs_ads_access.yml
Normal file
@@ -0,0 +1,36 @@
|
||||
title: NTFS Alternate Data Stream
|
||||
author: Sami Ruohonen
|
||||
date: 2018/07/24
|
||||
description: Detects writing data into NTFS alternate data streams from powershell.
|
||||
Needs Script Block Logging.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*set-content*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*add-content*'
|
||||
SELECTION_3:
|
||||
ScriptBlockText: '*-stream*'
|
||||
condition: ((SELECTION_1 or SELECTION_2) and (SELECTION_3))
|
||||
falsepositives:
|
||||
- unknown
|
||||
id: 8c521530-5169-495d-a199-0a3a881ad24e
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- http://www.powertheshell.com/ntfsstreams/
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1564.004/T1564.004.md
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1564.004
|
||||
- attack.t1096
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
yml_filename: powershell_ntfs_ads_access.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
31
rules/Sigma/powershell_powercat.yml
Normal file
31
rules/Sigma/powershell_powercat.yml
Normal file
@@ -0,0 +1,31 @@
|
||||
title: Netcat The Powershell Version
|
||||
author: frack113
|
||||
date: 2021/07/21
|
||||
description: Adversaries may use a non-application layer protocol for communication
|
||||
between host and C2 server or among infected hosts within a network
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ContextInfo: '*powercat *'
|
||||
SELECTION_2:
|
||||
ContextInfo: '*powercat.ps1*'
|
||||
condition: (SELECTION_1 or SELECTION_2)
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: bf7286e7-c0be-460b-a7e8-5b2e07ecc2f2
|
||||
level: medium
|
||||
logsource:
|
||||
category: ps_module
|
||||
definition: PowerShell Module Logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://nmap.org/ncat/
|
||||
- https://github.com/besimorhino/powercat
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1095/T1095.md
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.command_and_control
|
||||
- attack.t1095
|
||||
yml_filename: powershell_powercat.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_module
|
||||
|
||||
295
rules/Sigma/powershell_powerview_malicious_commandlets.yml
Normal file
295
rules/Sigma/powershell_powerview_malicious_commandlets.yml
Normal file
@@ -0,0 +1,295 @@
|
||||
title: Malicious PowerView PowerShell Commandlets
|
||||
author: Bhabesh Raj
|
||||
date: 2021/05/18
|
||||
description: Detects Commandlet names from PowerView of PowerSploit exploitation framework.
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*Export-PowerViewCSV*'
|
||||
SELECTION_10:
|
||||
ScriptBlockText: '*Invoke-UserImpersonation*'
|
||||
SELECTION_100:
|
||||
ScriptBlockText: '*Invoke-UserHunter*'
|
||||
SELECTION_101:
|
||||
ScriptBlockText: '*Find-DomainUserLocation*'
|
||||
SELECTION_102:
|
||||
ScriptBlockText: '*Invoke-ProcessHunter*'
|
||||
SELECTION_103:
|
||||
ScriptBlockText: '*Find-DomainProcess*'
|
||||
SELECTION_104:
|
||||
ScriptBlockText: '*Invoke-EventHunter*'
|
||||
SELECTION_105:
|
||||
ScriptBlockText: '*Find-DomainUserEvent*'
|
||||
SELECTION_106:
|
||||
ScriptBlockText: '*Invoke-ShareFinder*'
|
||||
SELECTION_107:
|
||||
ScriptBlockText: '*Find-DomainShare*'
|
||||
SELECTION_108:
|
||||
ScriptBlockText: '*Invoke-FileFinder*'
|
||||
SELECTION_109:
|
||||
ScriptBlockText: '*Find-InterestingDomainShareFile*'
|
||||
SELECTION_11:
|
||||
ScriptBlockText: '*Invoke-RevertToSelf*'
|
||||
SELECTION_110:
|
||||
ScriptBlockText: '*Find-LocalAdminAccess*'
|
||||
SELECTION_111:
|
||||
ScriptBlockText: '*Invoke-EnumerateLocalAdmin*'
|
||||
SELECTION_112:
|
||||
ScriptBlockText: '*Find-DomainLocalGroupMember*'
|
||||
SELECTION_113:
|
||||
ScriptBlockText: '*Get-NetDomainTrust*'
|
||||
SELECTION_114:
|
||||
ScriptBlockText: '*Get-DomainTrust*'
|
||||
SELECTION_115:
|
||||
ScriptBlockText: '*Get-NetForestTrust*'
|
||||
SELECTION_116:
|
||||
ScriptBlockText: '*Get-ForestTrust*'
|
||||
SELECTION_117:
|
||||
ScriptBlockText: '*Find-ForeignUser*'
|
||||
SELECTION_118:
|
||||
ScriptBlockText: '*Get-DomainForeignUser*'
|
||||
SELECTION_119:
|
||||
ScriptBlockText: '*Find-ForeignGroup*'
|
||||
SELECTION_12:
|
||||
ScriptBlockText: '*Request-SPNTicket*'
|
||||
SELECTION_120:
|
||||
ScriptBlockText: '*Get-DomainForeignGroupMember*'
|
||||
SELECTION_121:
|
||||
ScriptBlockText: '*Invoke-MapDomainTrust*'
|
||||
SELECTION_122:
|
||||
ScriptBlockText: '*Get-DomainTrustMapping*'
|
||||
SELECTION_13:
|
||||
ScriptBlockText: '*Get-DomainSPNTicket*'
|
||||
SELECTION_14:
|
||||
ScriptBlockText: '*Invoke-Kerberoast*'
|
||||
SELECTION_15:
|
||||
ScriptBlockText: '*Get-PathAcl*'
|
||||
SELECTION_16:
|
||||
ScriptBlockText: '*Get-DNSZone*'
|
||||
SELECTION_17:
|
||||
ScriptBlockText: '*Get-DomainDNSZone*'
|
||||
SELECTION_18:
|
||||
ScriptBlockText: '*Get-DNSRecord*'
|
||||
SELECTION_19:
|
||||
ScriptBlockText: '*Get-DomainDNSRecord*'
|
||||
SELECTION_2:
|
||||
ScriptBlockText: '*Get-IPAddress*'
|
||||
SELECTION_20:
|
||||
ScriptBlockText: '*Get-NetDomain*'
|
||||
SELECTION_21:
|
||||
ScriptBlockText: '*Get-Domain*'
|
||||
SELECTION_22:
|
||||
ScriptBlockText: '*Get-NetDomainController*'
|
||||
SELECTION_23:
|
||||
ScriptBlockText: '*Get-DomainController*'
|
||||
SELECTION_24:
|
||||
ScriptBlockText: '*Get-NetForest*'
|
||||
SELECTION_25:
|
||||
ScriptBlockText: '*Get-Forest*'
|
||||
SELECTION_26:
|
||||
ScriptBlockText: '*Get-NetForestDomain*'
|
||||
SELECTION_27:
|
||||
ScriptBlockText: '*Get-ForestDomain*'
|
||||
SELECTION_28:
|
||||
ScriptBlockText: '*Get-NetForestCatalog*'
|
||||
SELECTION_29:
|
||||
ScriptBlockText: '*Get-ForestGlobalCatalog*'
|
||||
SELECTION_3:
|
||||
ScriptBlockText: '*Resolve-IPAddress*'
|
||||
SELECTION_30:
|
||||
ScriptBlockText: '*Find-DomainObjectPropertyOutlier*'
|
||||
SELECTION_31:
|
||||
ScriptBlockText: '*Get-NetUser*'
|
||||
SELECTION_32:
|
||||
ScriptBlockText: '*Get-DomainUser*'
|
||||
SELECTION_33:
|
||||
ScriptBlockText: '*New-DomainUser*'
|
||||
SELECTION_34:
|
||||
ScriptBlockText: '*Set-DomainUserPassword*'
|
||||
SELECTION_35:
|
||||
ScriptBlockText: '*Get-UserEvent*'
|
||||
SELECTION_36:
|
||||
ScriptBlockText: '*Get-DomainUserEvent*'
|
||||
SELECTION_37:
|
||||
ScriptBlockText: '*Get-NetComputer*'
|
||||
SELECTION_38:
|
||||
ScriptBlockText: '*Get-DomainComputer*'
|
||||
SELECTION_39:
|
||||
ScriptBlockText: '*Get-ADObject*'
|
||||
SELECTION_4:
|
||||
ScriptBlockText: '*Convert-NameToSid*'
|
||||
SELECTION_40:
|
||||
ScriptBlockText: '*Get-DomainObject*'
|
||||
SELECTION_41:
|
||||
ScriptBlockText: '*Set-ADObject*'
|
||||
SELECTION_42:
|
||||
ScriptBlockText: '*Set-DomainObject*'
|
||||
SELECTION_43:
|
||||
ScriptBlockText: '*Get-ObjectAcl*'
|
||||
SELECTION_44:
|
||||
ScriptBlockText: '*Get-DomainObjectAcl*'
|
||||
SELECTION_45:
|
||||
ScriptBlockText: '*Add-ObjectAcl*'
|
||||
SELECTION_46:
|
||||
ScriptBlockText: '*Add-DomainObjectAcl*'
|
||||
SELECTION_47:
|
||||
ScriptBlockText: '*Invoke-ACLScanner*'
|
||||
SELECTION_48:
|
||||
ScriptBlockText: '*Find-InterestingDomainAcl*'
|
||||
SELECTION_49:
|
||||
ScriptBlockText: '*Get-NetOU*'
|
||||
SELECTION_5:
|
||||
ScriptBlockText: '*ConvertTo-SID*'
|
||||
SELECTION_50:
|
||||
ScriptBlockText: '*Get-DomainOU*'
|
||||
SELECTION_51:
|
||||
ScriptBlockText: '*Get-NetSite*'
|
||||
SELECTION_52:
|
||||
ScriptBlockText: '*Get-DomainSite*'
|
||||
SELECTION_53:
|
||||
ScriptBlockText: '*Get-NetSubnet*'
|
||||
SELECTION_54:
|
||||
ScriptBlockText: '*Get-DomainSubnet*'
|
||||
SELECTION_55:
|
||||
ScriptBlockText: '*Get-DomainSID*'
|
||||
SELECTION_56:
|
||||
ScriptBlockText: '*Get-NetGroup*'
|
||||
SELECTION_57:
|
||||
ScriptBlockText: '*Get-DomainGroup*'
|
||||
SELECTION_58:
|
||||
ScriptBlockText: '*New-DomainGroup*'
|
||||
SELECTION_59:
|
||||
ScriptBlockText: '*Find-ManagedSecurityGroups*'
|
||||
SELECTION_6:
|
||||
ScriptBlockText: '*Convert-ADName*'
|
||||
SELECTION_60:
|
||||
ScriptBlockText: '*Get-DomainManagedSecurityGroup*'
|
||||
SELECTION_61:
|
||||
ScriptBlockText: '*Get-NetGroupMember*'
|
||||
SELECTION_62:
|
||||
ScriptBlockText: '*Get-DomainGroupMember*'
|
||||
SELECTION_63:
|
||||
ScriptBlockText: '*Add-DomainGroupMember*'
|
||||
SELECTION_64:
|
||||
ScriptBlockText: '*Get-NetFileServer*'
|
||||
SELECTION_65:
|
||||
ScriptBlockText: '*Get-DomainFileServer*'
|
||||
SELECTION_66:
|
||||
ScriptBlockText: '*Get-DFSshare*'
|
||||
SELECTION_67:
|
||||
ScriptBlockText: '*Get-DomainDFSShare*'
|
||||
SELECTION_68:
|
||||
ScriptBlockText: '*Get-NetGPO*'
|
||||
SELECTION_69:
|
||||
ScriptBlockText: '*Get-DomainGPO*'
|
||||
SELECTION_7:
|
||||
ScriptBlockText: '*ConvertFrom-UACValue*'
|
||||
SELECTION_70:
|
||||
ScriptBlockText: '*Get-NetGPOGroup*'
|
||||
SELECTION_71:
|
||||
ScriptBlockText: '*Get-DomainGPOLocalGroup*'
|
||||
SELECTION_72:
|
||||
ScriptBlockText: '*Find-GPOLocation*'
|
||||
SELECTION_73:
|
||||
ScriptBlockText: '*Get-DomainGPOUserLocalGroupMapping*'
|
||||
SELECTION_74:
|
||||
ScriptBlockText: '*Find-GPOComputerAdmin*'
|
||||
SELECTION_75:
|
||||
ScriptBlockText: '*Get-DomainGPOComputerLocalGroupMapping*'
|
||||
SELECTION_76:
|
||||
ScriptBlockText: '*Get-DomainPolicy*'
|
||||
SELECTION_77:
|
||||
ScriptBlockText: '*Get-NetLocalGroup*'
|
||||
SELECTION_78:
|
||||
ScriptBlockText: '*Get-NetLocalGroupMember*'
|
||||
SELECTION_79:
|
||||
ScriptBlockText: '*Get-NetShare*'
|
||||
SELECTION_8:
|
||||
ScriptBlockText: '*Add-RemoteConnection*'
|
||||
SELECTION_80:
|
||||
ScriptBlockText: '*Get-NetLoggedon*'
|
||||
SELECTION_81:
|
||||
ScriptBlockText: '*Get-NetSession*'
|
||||
SELECTION_82:
|
||||
ScriptBlockText: '*Get-LoggedOnLocal*'
|
||||
SELECTION_83:
|
||||
ScriptBlockText: '*Get-RegLoggedOn*'
|
||||
SELECTION_84:
|
||||
ScriptBlockText: '*Get-NetRDPSession*'
|
||||
SELECTION_85:
|
||||
ScriptBlockText: '*Invoke-CheckLocalAdminAccess*'
|
||||
SELECTION_86:
|
||||
ScriptBlockText: '*Test-AdminAccess*'
|
||||
SELECTION_87:
|
||||
ScriptBlockText: '*Get-SiteName*'
|
||||
SELECTION_88:
|
||||
ScriptBlockText: '*Get-NetComputerSiteName*'
|
||||
SELECTION_89:
|
||||
ScriptBlockText: '*Get-Proxy*'
|
||||
SELECTION_9:
|
||||
ScriptBlockText: '*Remove-RemoteConnection*'
|
||||
SELECTION_90:
|
||||
ScriptBlockText: '*Get-WMIRegProxy*'
|
||||
SELECTION_91:
|
||||
ScriptBlockText: '*Get-LastLoggedOn*'
|
||||
SELECTION_92:
|
||||
ScriptBlockText: '*Get-WMIRegLastLoggedOn*'
|
||||
SELECTION_93:
|
||||
ScriptBlockText: '*Get-CachedRDPConnection*'
|
||||
SELECTION_94:
|
||||
ScriptBlockText: '*Get-WMIRegCachedRDPConnection*'
|
||||
SELECTION_95:
|
||||
ScriptBlockText: '*Get-RegistryMountedDrive*'
|
||||
SELECTION_96:
|
||||
ScriptBlockText: '*Get-WMIRegMountedDrive*'
|
||||
SELECTION_97:
|
||||
ScriptBlockText: '*Get-NetProcess*'
|
||||
SELECTION_98:
|
||||
ScriptBlockText: '*Get-WMIProcess*'
|
||||
SELECTION_99:
|
||||
ScriptBlockText: '*Find-InterestingFile*'
|
||||
condition: (SELECTION_1 or SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5
|
||||
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10
|
||||
or SELECTION_11 or SELECTION_12 or SELECTION_13 or SELECTION_14 or SELECTION_15
|
||||
or SELECTION_16 or SELECTION_17 or SELECTION_18 or SELECTION_19 or SELECTION_20
|
||||
or SELECTION_21 or SELECTION_22 or SELECTION_23 or SELECTION_24 or SELECTION_25
|
||||
or SELECTION_26 or SELECTION_27 or SELECTION_28 or SELECTION_29 or SELECTION_30
|
||||
or SELECTION_31 or SELECTION_32 or SELECTION_33 or SELECTION_34 or SELECTION_35
|
||||
or SELECTION_36 or SELECTION_37 or SELECTION_38 or SELECTION_39 or SELECTION_40
|
||||
or SELECTION_41 or SELECTION_42 or SELECTION_43 or SELECTION_44 or SELECTION_45
|
||||
or SELECTION_46 or SELECTION_47 or SELECTION_48 or SELECTION_49 or SELECTION_50
|
||||
or SELECTION_51 or SELECTION_52 or SELECTION_53 or SELECTION_54 or SELECTION_55
|
||||
or SELECTION_56 or SELECTION_57 or SELECTION_58 or SELECTION_59 or SELECTION_60
|
||||
or SELECTION_61 or SELECTION_62 or SELECTION_63 or SELECTION_64 or SELECTION_65
|
||||
or SELECTION_66 or SELECTION_67 or SELECTION_68 or SELECTION_69 or SELECTION_70
|
||||
or SELECTION_71 or SELECTION_72 or SELECTION_73 or SELECTION_74 or SELECTION_75
|
||||
or SELECTION_76 or SELECTION_77 or SELECTION_78 or SELECTION_79 or SELECTION_80
|
||||
or SELECTION_81 or SELECTION_82 or SELECTION_83 or SELECTION_84 or SELECTION_85
|
||||
or SELECTION_86 or SELECTION_87 or SELECTION_88 or SELECTION_89 or SELECTION_90
|
||||
or SELECTION_91 or SELECTION_92 or SELECTION_93 or SELECTION_94 or SELECTION_95
|
||||
or SELECTION_96 or SELECTION_97 or SELECTION_98 or SELECTION_99 or SELECTION_100
|
||||
or SELECTION_101 or SELECTION_102 or SELECTION_103 or SELECTION_104 or SELECTION_105
|
||||
or SELECTION_106 or SELECTION_107 or SELECTION_108 or SELECTION_109 or SELECTION_110
|
||||
or SELECTION_111 or SELECTION_112 or SELECTION_113 or SELECTION_114 or SELECTION_115
|
||||
or SELECTION_116 or SELECTION_117 or SELECTION_118 or SELECTION_119 or SELECTION_120
|
||||
or SELECTION_121 or SELECTION_122)
|
||||
falsepositives:
|
||||
- Should not be any as administrators do not use this tool
|
||||
id: dcd74b95-3f36-4ed9-9598-0490951643aa
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script Block Logging must be enable
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://powersploit.readthedocs.io/en/stable/Recon/README
|
||||
- https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon
|
||||
- https://thedfirreport.com/2020/10/08/ryuks-return
|
||||
- https://adsecurity.org/?p=2277
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: powershell_powerview_malicious_commandlets.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
29
rules/Sigma/powershell_prompt_credentials.yml
Normal file
29
rules/Sigma/powershell_prompt_credentials.yml
Normal file
@@ -0,0 +1,29 @@
|
||||
title: PowerShell Credential Prompt
|
||||
author: John Lambert (idea), Florian Roth (rule)
|
||||
date: 2017/04/09
|
||||
description: Detects PowerShell calling a credential prompt
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*PromptForCredential*'
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: ca8b77a9-d499-4095-b793-5d5f330d450e
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://twitter.com/JohnLaTwC/status/850381440629981184
|
||||
- https://t.co/ezOTGy1a1G
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
yml_filename: powershell_prompt_credentials.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
27
rules/Sigma/powershell_psattack.yml
Normal file
27
rules/Sigma/powershell_psattack.yml
Normal file
@@ -0,0 +1,27 @@
|
||||
title: PowerShell PSAttack
|
||||
author: Sean Metcalf (source), Florian Roth (rule)
|
||||
date: 2017/03/05
|
||||
description: Detects the use of PSAttack PowerShell hack tool
|
||||
detection:
|
||||
SELECTION_1:
|
||||
ScriptBlockText: '*PS ATTACK!!!*'
|
||||
condition: SELECTION_1
|
||||
falsepositives:
|
||||
- Pentesters
|
||||
id: b7ec41a4-042c-4f31-a5db-d0fcde9fa5c5
|
||||
level: high
|
||||
logsource:
|
||||
category: ps_script
|
||||
definition: Script block logging must be enabled
|
||||
product: windows
|
||||
modified: 2021/10/16
|
||||
references:
|
||||
- https://adsecurity.org/?p=2921
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1086
|
||||
yml_filename: powershell_psattack.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/powershell/powershell_script
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user